Security
News & Commentary
Changing the Security Mindset
Kelly Sheridan, Associate Editor, Insurance & Technology
As cyber attacks evolve in number and complexity, financial services organizations must embrace proactive security strategies.
By Kelly Sheridan Associate Editor, Insurance & Technology,
Comment6 comments  |  Read  |  Post a Comment
Why You Shouldn't Count On General Liability To Cover Cyber Risk
Ericka Chickowski, Contributing Writer, Dark Reading
Travelers Insurance's legal spat with P.F. Chang's over who'll pay breach costs will likely illustrate why enterprises shouldn't think of their general liability policies as backstops for cyber risk.
By Ericka Chickowski Contributing Writer, Dark Reading,
Comment0 comments  |  Read  |  Post a Comment
Connected Cars Vs. Cybercrime: Tough Fight
Jai Vijayan, Freelance writer
Automakers should consider adding real-time intrusion detection and response capabilities, National Highway Traffic Safety Administration says.
By Jai Vijayan Freelance writer,
Comment0 comments  |  Read  |  Post a Comment
Cyberinsurance Resurges In The Wake Of Mega-Breaches
Kelly Jackson Higgins, Executive Editor at Dark Reading
Insurance policies customized for cyberattack protection are on the rise as businesses worry they could be the next Target.
By Kelly Jackson Higgins Executive Editor at Dark Reading,
Comment0 comments  |  Read  |  Post a Comment
Leverage Analytics for Improved Fraud Detection
Saurabh Tandon, Senior Manager, Mu Sigma
Insurers must counter smarter and more sophisticated defrauders through tech approaches that leverage data analytics.
By Saurabh Tandon Senior Manager, Mu Sigma,
Comment1 Comment  |  Read  |  Post a Comment
Progressive Selects BAE Systems to Detect Fraud
Kelly Sheridan, Associate Editor, Insurance & Technology
The solution will be used to enhance the recognition of claims fraud in auto insurance.
By Kelly Sheridan Associate Editor, Insurance & Technology,
Comment1 Comment  |  Read  |  Post a Comment
What Have We Learned About Risk Management Since 9/11?
Kathy Burger, Editorial Director
Technology has transformed the practice of risk management, but with threats growing more complex and sophisticated, has anything really changed?
By Kathy Burger Editorial Director,
Comment4 comments  |  Read  |  Post a Comment
Will Apple Legitimize Mobile Payments?
Bryan Yurcan, Associate Editor, Bank Systems and Technology
The company announced its new mobile payments system, Apple Pay.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment1 Comment  |  Read  |  Post a Comment
HealthCare.gov Breach: The Ripple Effect
Alison Diana, Senior Editor
Hackers breached a HealthCare.gov test server, reportedly affecting no records, but the repercussions could spread across many medical organizations.
By Alison Diana Senior Editor,
Comment0 comments  |  Read  |  Post a Comment
4 Hurdles To Securing The Internet Of Things
Kelly Jackson Higgins, Executive Editor at Dark Reading
Why locking down even the tiniest embedded devices is a tall order.
By Kelly Jackson Higgins Executive Editor at Dark Reading,
Comment0 comments  |  Read  |  Post a Comment
Celeb Hack: Is Apple Telling All It Knows?
Dave Kearns, Analyst, Kuppinger-Cole
Did Apple have a system-wide data breach? No. Was it complicit through an appalling security lapse by not defending against brute force attacks? You're darn tootin'!
By Dave Kearns Analyst, Kuppinger-Cole,
Comment0 comments  |  Read  |  Post a Comment
Apple Not Hacked In Celebrity Nude Photo Breaches
Kelly Jackson Higgins, Executive Editor at Dark Reading
'Very targeted attack' on celebrities' Apple usernames, passwords, security questions -- iCloud, Find My iPhone not breached, Apple says.
By Kelly Jackson Higgins Executive Editor at Dark Reading,
Comment0 comments  |  Read  |  Post a Comment
Getting Social: Top Tips for Establishing a Social Media Plan
Bill Shute, is executive vice president, corporate strategy and marketing, at Viewpointe
As the influence of social media channels continues to grow, organizations must have a handle on the regulations and the risks social can introduce to a firm.
By Bill Shute is executive vice president, corporate strategy and marketing, at Viewpointe,
Comment1 Comment  |  Read  |  Post a Comment
BYOD Policy: Don't Reinvent the Wheel
Becca Lipman, Senior Editor
Financial firms still feel overwhelmed by BYOD risks and challenges. But these can be addressed by a good policy, and the guidelines are already out there.
By Becca Lipman Senior Editor,
Comment1 Comment  |  Read  |  Post a Comment
Business Continuity 2.0: We’re Gonna Need a Bigger Boat
Mitchel Kraskin, Co-founder and CEO, Compliance Science
What would happen with a long-term outage to financial systems or the nation's critical infrastructure? Businesses aren't even close to being prepared.
By Mitchel Kraskin Co-founder and CEO, Compliance Science,
Comment1 Comment  |  Read  |  Post a Comment
Improving Claims Management With Advanced Integration
Scott R. Smith and Ajit Viswanathan, Mitchell International,
The technology improvements achieved through advanced integration can boost adjuster efficiency, empower better decisions, and deliver a better customer experience.
By Scott R. Smith and Ajit Viswanathan, Mitchell International ,
Comment1 Comment  |  Read  |  Post a Comment
Driving Information Security, From Silicon Valley to Detroit
Christopher Camejo, Director of Assessment Services, NTT Com Security
As software interacts with more and more of our daily lives, technology providers may be liable for more damages than they have in the recent past.
By Christopher Camejo Director of Assessment Services, NTT Com Security,
Comment0 comments  |  Read  |  Post a Comment
Tech Insight: Hacking The Nest Thermostat
John H. Sawyer, Contributing Writer, Dark Reading
Researchers at Black Hat USA demonstrated how they were able to compromise a popular smart thermostat.
By John H. Sawyer Contributing Writer, Dark Reading,
Comment0 comments  |  Read  |  Post a Comment
Talent Acquisition Low on Insurers’ Priorities
Kelly Sheridan, Associate Editor, Insurance & Technology
An Xchanging poll from this year’s Acord-Loma conference revealed insurers’ plans to spend little on attracting qualified employees.
By Kelly Sheridan Associate Editor, Insurance & Technology,
Comment2 comments  |  Read  |  Post a Comment
Data Breaches: The True Cost
Bryan Yurcan, Associate Editor, Bank Systems and Technology
The costs of data breaches extend far beyond the information that was stolen.
By Bryan Yurcan Associate Editor, Bank Systems and Technology,
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Twitter Feed
PR Newswire
Register for Insurance & Technology Newsletters
White Papers
Current Issue
Insurance & Technology Digital Issue Oct. 27, 2014
Innovation? Check. Core modernization? Check. Security? Check. Today's insurance IT challenges don't stump this year's Elite 8.
Slideshows