Privacy in the Digital Age

Earlier this month, I had the privilege of attending the 2014 Privacy Xchange Forum, my first cyber event not specifically about insurance. The forum, presented by IDT911, was a well-planned, well-executed event with excellent speakers. Two speakers in particular caught my attention. The first was Kevin Ashton. Ashton is known for coining the term Internet […]

Payment cards: Is the PIN more dangerous than the pen?

President Obama recently announced that, starting next year, all federal government credit and debit cards will feature microchips and require the use of PIN numbers. The technology, called “chip and PIN,” or EMV (Europay, MasterCard, and Visa), is widely used in Europe and considered significantly more secure. Instead of recording all the transactions on the […]

Raising Awareness about Cyber Risk

To develop a new product, the first step to success is always the same: Understand the customer’s need. But the need is not the product you’re selling. It’s the problem your product is trying to solve. I mention this because the cyber insurance survey results we released last week found that most companies today don’t […]

Does Cyber across the Pond Differ from Cyber in the United States?

Earlier this month, I had the pleasure of attending the HB Litigation NetDiligence® Cyber Risk & Privacy Liability Forum in Santa Monica. In addition to enjoying the wonderful California fall weather, I had the opportunity to listen to many experts talk about various timely cyber-related issues. One of the most interesting sessions I attended was […]

The Internet of Things — Back To The Future … All Over Again

When I was growing up, I was a huge fan of the Dick Tracy comic strip and television shows like The Jetsons and Star Trek. Back then, in the days of rotary dial telephones and party lines, I thought that it would be great if I could talk to someone with Dick Tracy’s wrist radio, […]

The Dangers of Data Breach Fatigue

There was a time, not so long ago, when we used fax modems to surf the Internet, stored our data on diskettes, and needed to possess both extraordinary intelligence and lightning fast typing skills to hack into computers. Nowadays, anyone with a laptop and online connection can learn to break into a database, steal confidential […]