Identity Risk Shifts As AI Drives New Wave Of Impersonation Attacks

Identity risk can start with a seemingly routine call. At 9:17 a.m., the help desk phone rings. The voice sounds calm, familiar, and slightly annoyed. It belongs to the CFO. Or seems to. He says he is locked out and needs access restored right away. The technician recognizes the voice and sends the reset link. … Read more

BreachRx Launches Warranty To Back Cyber Incident Response Programs

BreachRx announced a new financial warranty tied to its cyber incident response management platform. The company said the offering provides up to $3 million in protection for executive and corporate liability tied to eligible cybersecurity incidents. A global insurance partner underwrites the warranty. It works alongside cyber insurance and D&O coverage to address executive protection … Read more

Markel Expands Cyber Leadership With Jamie Smith As US Cyber Lead

Markel Insurance has named Jamie Smith as London Underwriting Manager – US Cyber Lead, effective immediately, enhancing its cyber insurance leadership. Smith will lead the US cyber segment of Markel’s London Market portfolio, focusing on underwriting and growth. Smith will collaborate with actuarial teams on portfolio analysis, strategic planning, broker engagement, and policy improvements to … Read more

Cyber Insurance Claims Report: 86% Of Ransomware Victims Eighty-Six The Idea Of Paying

In the old Popeye cartoons, Wimpy liked to say, “I’ll gladly pay you Tuesday for a hamburger today.” When it comes to ransomware payment, companies seem to be stealing Wimpy’s line and saying, “I’ll gladly pay you Tuesday for your ransomware today.” And just like the cartoon, Tuesday, or “pay day,” never comes. Coalition’s new … Read more

Data Governance and Cyber Risk: Why Data Sprawl Is the Hidden Liability – NEW PODCAST

Data governance has become one of the most critical and overlooked components of cybersecurity and cyber insurance risk management. Organizations invest heavily in preventing intrusions, but far fewer pay attention to what happens after attackers get in. Breaches are bound to happen. The real cost depends on how much data, how sensitive it is, and … Read more

×