You've requested...

Vulnerability Leads to a Rise in Data Insurance

If a new window did not open, click here to view this asset.

Download this next:

Insuring the uninsurable: Is cyber insurance worth its salt?

Cyber insurance is one of the fastest growing areas of risk cover in the insurance industry as businesses increasingly turn to specialist insurance in an attempt to cover a portion of their enterprise risk.

 Cyber risk is notoriously difficult to quantify and businesses face an arduous choice in deciding which risks to manage themselves and which risks to transfer to the insurance market.

 This article dips a toe into this emerging risk area and outlines some steps businesses can take to make better informed risk mitigation decisions.

These are also closely related to: "Vulnerability Leads to a Rise in Data Insurance"

  • E-Guide: Balancing compliance with information security threat assessment

    With compliance, also comes responsibility and at some points, stress. Implementing the rules and regulations of a specific industry can be difficult, making it hard for companies to accomplish the task at hand: being successful. In this expert E-Guide, you will learn that the hassle of compliance is worth it in the long run for your company and can be worked into your everyday culture.

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems (83%) than any other sector (with e-commerce firms at 28% and both telcos and retailers at 13%).

    However, the financial services industry doesn’t share the same sentiment. Just one in five banking executives (21%) are highly confident in their ability to detect a breach, let alone defend against it. 

Find more content like what you just read:

  • April Essential Guide to Data Protection

    In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.

    Download

  • CW Buyers Guide To Finance and Insurance

    This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.

    Download

  • 7 top predictive analytics use cases

    Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.

    Download

  • Ransomware: How it starts via email & how to prevent it

    Unless Ransomware is stopped before reaching end users, it will continue to cause severe financial losses and reputational damage—and continue to pad the pockets of cybercriminals. Open this guide to explore the ins and outs of ransomware and how to prevent it.

    Download

  • SASE: The driver of your SaaS security journey

    SaaS applications have become popular in recent years due to their widespread availability, ease of use, and low costs – but they’re not always secure. In this white paper, you will learn about how a SASE solution is designed to assist your cloud transformation and safely adopt SaaS applications. Download now to learn about solution benefits.

    Download

  • Meet the GRC challenges of the cloud head-on

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

    Download

  • Mobile Device Data Protection: Key Findings and Players in the Market

    This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

    Download

  • A Computer Weekly buyer's guide to cyber insurance

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

    Download

  • A buyers guide to cyber insurance

    With cyberattacks on the rise, the demand for cyber insurance is skyrocketing.But with so many classifications and options, how do you know what to look for? This buyer’s guide highlights and breaks down the key types of cyber insurance to give you a stronger understanding of what to look for in a solution. Download now to learn more.

    Download

  • Security Incidents: How Can You Minimize Their Impact?

    Inside ARG’s “Cybersecurity Market Insights & Decision Guide,” you can discover three goals on which to focus in order to minimize the impact of a cybersecurity incident.

    Download

  • Your roadmap for automating security processes

    Read this white paper to learn how you can transform your IT security operations and confidently support continuous digital transformation and innovation, with ServiceNow. You’ll discover how to save your IT security staff up to 8,700 hours a year while driving cyber resilience, with a single platform.

    Download

  • The automobile root of trust for device attestation and data security

    As automobile development becomes increasingly complex, the potential vulnerability and threat landscape also grows. This white paper further explores the complexities of automobile compliance, advocating for car manufacturers to apply a zero-trust approach to take device attestation and data security seriously. Read on to learn more.

    Download

  • Cyber insurance: Heads they win, tails they win, too?

    “Insurance, as it’s currently practiced, is usually heads they win and tails they win, too,” explains cybersecurity expert Eric Gyasi to Tanium’s magazine Focal Point. “Cyber has upended that model quite a bit.” In this white paper, discover strategies for navigating the tricky terrain of cyber insurance.

    Download

  • ESG Report: Analyzing the economic benefits of cyber resilience with Commvault Cloud

    Enterprise Strategy Group analyzed Commvault Cloud, powered by Metallic AI, and interviewed current customers to understand its impact on IT and business goals. The analysis revealed potential financial benefits in 3 areas: cost efficiency, increased agility, and reduced risk. Download the report now to learn more.

    Download

  • Cybersecurity Market Insights & Decision Guide

    Done correctly, cybersecurity goes beyond tools and applications to encompass how you deploy and configure technology. With this guide, learn how to protect your organization and prepare for an audit.

    Download

  • Looking Back on 25 Years of Linux

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

    Download

  • Security leader’s guide to cybersecurity strategy

    The success of cybersecurity can only be achieved through a strategic approach that effectively combines different tools to address the problems at hand. This e-book contains several examples of cybersecurity power plays that can dramatically boost security efficacy and operational efficiency. Read on to learn more.

    Download

  • Financial markets regulatory outlook 2017

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

    Download

  • Ensure your backups meet compliance standards

    In the event of a data breach or cyberattack, you never want a client to lose their valuable data. That’s why backup monitoring is crucial for maintaining security and compliance. Read on to learn about best practices for meeting compliance standards and mitigating risk for your clients and your organization.

    Download

  • Network security: Why you need more visibility

    To minimize the risk of breaches and rapidly identify successful intrusions and contain their damage, managers and security teams need full visibility across their entire IT and network estates. Read this IDG brief to see how Forward Networks can help you attain a single source of truth for network and IT security.

    Download

  • 8-page paper: Healthcare cybersecurity insights

    To deepen your understanding of the state of cybersecurity in the healthcare industry, and to learn about 3 major security risks, download this 8-page white paper.

    Download

  • Personalizing interactions: The digital experience guide

    When 81% of today’s customers agree that ease of use is important to digital experiences for brands, and that 60% of them have stopped using an online service due to frustration with login processes, it’s become critical for organizations to prioritize more personal interactions. Browse this white paper to learn more.

    Download

  • Top 10 Australia IT stories of 2018

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.

    Download

  • Expert Guide to web 2.0 Threats: How to Prevent an Attack

    A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.

    Download

  • Endpoint Security IT Decision Center Handbook 1

    Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.

    Download

  • Improve risk management by connecting business & IT

    Organisations that invest in resilience during times of uncertainty are better able to seize opportunity when it arises. In this eBook, discover how you can optimise operations, reduce costs and risk and boost resilience by connecting business and IT on a single platform. Learn more about Integrated Risk Management from ServiceNow in this ebook.

    Download

  • Achieve risk-based vulnerability management

    Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.

    Download

  • Traditional vs. enterprise risk management: How do they differ?

    Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.

    Download

  • Your Blueprint to Cloud Adoption

    As workloads move across different environments and data is repatriated on-premises, maintaining cyber resilience becomes a major challenge. This complex hybrid world requires a clear blueprint for cloud data protection that extends to the edge of your environment. Get started with your own cloud blueprint by downloading this e-book now!

    Download

  • How ASM weaknesses lead to security incidents

    Today’s organizations possess Internet-facing attack surfaces, filled with thousands of assets. Due to this growth in complexity, traditional attack surface management platforms (ASMs) are no longer sufficient. In this white paper, ESG analyze the demands of a modern-day attack surface and what is needed in an ASM offering. Read on to learn more.

    Download

  • Value drivers for an attack surface management (ASM) program

    Today’s organizations possess Internet-facing attack surfaces, filled with thousands of assets. Due to this growth in complexity, traditional attack surface management platforms (ASMs) are no longer sufficient. In this white paper, ESG analyze the demands of a modern-day attack surface and what is needed in an ASM offering. Read on to learn more.

    Download

  • VMworld 2017 recap: Adapting legacy IT

    In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.

    Download

  • CW ANZ, November 2018: Exploring blockchain

    Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.

    Download

  • How to prepare for cyberattacks to secure your data

    With cyberattack surfaces now including cloud, mobile, Internet of Things (IoT) and more, understanding those environments and the threats that they face is challenging, and many organizations can become intimidated and overwhelmed by the process. Access this white paper to discover the best ways to prepare and combat these risks.

    Download

  • Defining Your Corporate Mobile Policies

    It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization

    Download

  • E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats

    This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.

    Download

  • Strategies for winning the battle for the policyholder

    According to recent research insurance profits fell by about 15% across the sector over the last year. This white paper examines the opportunities for insurance businesses willing to lean in on new and emerging technologies and outline the strategies that could bring success in a sector in flux. Download now to learn more.

    Download

  • Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics

    In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • Managing M&A Risk

    To optimally manage cyber risk in the mergers and acquisitions process, acquiring organizations need a rapid, accurate way to map all the endpoint assets in a target company. Read about how this is done in Managing M&A Risk: How Endpoint Visibility Can Deliver Critical Advantages.

    Download

  • CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?

    Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.

    Download

  • Are you one eDiscovery away from a budgetary meltdown?

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

    Download

  • The Total Economic Impact of Ensono IT Infrastructure Management Services

    In today’s evolving workforce, enterprises considering outsourcing must look beyond hard cost savings to enable activities that accelerate innovation, improve retention and create differentiation, according to a Forrester report. Access now to explore the ROI enterprises may realize by deploying Ensono’s IT infrastructure management services.

    Download

  • Lessons in attack surface risk based on observable data

    Software as a service (SaaS) deployments and cloud migration initiatives have fueled a dramatic increase in infrastructure, too rapid to be accurately understood. To put these trends into context and provide actionable intelligence, Unit 42 analyzed several petabytes of public internet data. Download this report to unlock all their key findings.

    Download

  • Select the Right Cloud Integration Tool For Your Business

    As the adoption rate of cloud computing services and applications continues to rise, organizations are realizing that cloud migration is not a do-it-yourself type project. Access this expert e-guide to find out how leveraging a cloud integration platform can significantly simplify your transition to the cloud.

    Download

  • Top 10 cyber crime stories of 2019

    Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.

    Download

  • The various ways to fight new and emerging cybercrime

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

    Download