Latest Posts › Cybersecurity

Share:

Cyber Insurance: Court’s Recent Decisions May Change What Your Policy Covers

Cyber incidents can take many forms—phishing, insider theft, SQL injection, malware, denial of service, session hijacking, credential farming, or just old fashion “hacking.” Although many of these attack vectors employ...more

Top 10 Things to Do in the Event of a Data Breach

This webinar focuses on strategies for mitigating reputational, litigation, and regulatory risk in the post-data breach environment. We will offer specific practice tips to implement during this crisis period that are...more

Out of the Box: Federal Court in Utah Denies Duty to Defend under Cyber Policy

Cyber coverage may be the hottest topic in the insurance industry. More carriers are offering cyber coverage, and more consumers are coming to the market, trying to figure out what to buy with their premium dollars. And those...more

Learning from Target: Insurance Coverage for Data Breaches

Cyber liability is a clear and present danger. Target Corp. recently reported at least $235 million as gross expenses related to its 2013 data breach. Fortunately, Target was able to recover $90 million of that loss under...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide