insurance

Home/Tag: insurance

Let the Cyber Litigation Begin!

Cyber Insurance is squarely in the spotlight; the case of P.F. Chang’s China Bistro Inc. v. Federal Insurance Co. has been heard and could signal an onslaught of litigation between cyber insurers and policyholders. Chubb Ltd. will not be required to reimburse P.F. Chang's for costs charged the restaurant chain related to credit card processing in connection with a 2014 data breach under its cyber policy. For those interested in the details of the case and position Chubb proffered, here [...]

2017-06-22T20:19:38-04:00By |Tags: , , , |

Today’s SDLC and Cybersecurity – Coding, SMEs, and Spaghetti

One of our friends in the insurance world sent us an email with an interesting article about the nature of "secure programming" (see here for the article) and how it has influenced some of the information security challenges the market is facing. I initially shared my insights (below) to the email, but I figured it was worth posting. Enjoy! -- -- Over 30 years ago, one of my personal heroes (Ken Thompson, coder-extraordinaire and inventor of the B and Go programming languages) said something [...]

The Developing Cybersecurity Marketplace

The Economist recently published an article, "Cyber-security: The cost of immaturity" in their November 7th edition. In the article, the authors discuss how the "business of protecting against computer hacking is booming." To quote part of their article, "A report by Bank of America Merrill Lynch reckons the market is $75 billion a year now and will be $170 billion by 2020. Not only is demand soaring, but barriers to entry are low. Anyone able to spout out a bit [...]

CLE Credit Class – Minimizing the Risk of Cyber Exposure for Today’s Law Firm

Layer 8 Security is hosting a class with Precise about reducing the risk of cyber exposure for law firms at the offices of Expert Technology Associates. To register for the event, visit http://www.eventbrite.com/e/minimizing-the-risk-of-cyber-exposure-for-todays-law-firm-1-pa-ethics-cle-credit-tickets-18650999642. See below for details!

Networking Reception at The Union League of Philadelphia – October 21, 2015

Layer 8 Security and managed security provider, eSentire, are hosting a networking reception at The Union League of Philadelphia. To register for the event, visit www2.esentire.com/UnionLeageOct21. See below for details!

Why Companies Respond Slowly To Breaches

You'd think it would be a long, drawn out reason, with lots of calculations and pretty charts. It's not. Per a recent piece in CSO, firms respond slowly to most of these breaches because, in spite of what you might have thought, the costs are relatively low. For an example, the article cited the recent Home Depot credit card debacle. The net cost wound up being around $28 million dollars-which doesn't seem too small to most of us. Take out [...]

Cyber insurance regulations: Senate probes federal data breach protections bill

Cyber insurance is becoming a significant market force that will drive improved cyber security for both companies and by extension the consumers and the nation as a whole. It is more than just an instrument to transfer risk, it provides incentives to understand and mitigate risks. To wit, attached is a summary of the most recent Senate hearing: U.S. Sen. Jerry Moran (R-Kan.), chair of the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security, held a hearing March [...]

Cyber insurance regulations: Senate probes federal data breach protections bill

Cyber insurance is becoming a significant market force that will drive improved cyber security for both companies and by extension the consumers and the nation as a whole. It is more than just an instrument to transfer risk, it provides incentives to understand and mitigate risks. To wit, attached is a summary of the most recent Senate hearing: U.S. Sen. Jerry Moran (R-Kan.), chair of the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security, held a hearing March [...]

2017-06-22T20:19:42-04:00By |Tags: , , , , , |