Data Breach Liability: Court Expands Insurance Coverage in Email Mishap

Court Decision Highlights Overlapping Coverage An English court clarified how multiple insurance policies, not just cyber insurance, can apply to a single data breach incident, offering lessons for companies and brokers about data breach liability. As outlined in a recent A&O Shearman blog, the case revolved around a housing association’s misdirected email in 2020 that … Read more

Lee Enterprises Files Cyber Insurance Claim to Cover “Significant Impact” Of Hack

A publisher of newspaper and digital news covering 72 markets in 25 states across the U.S., Lee Enterprises (NASDAQ: LEE) experienced a “cyber security incident” in February that had a “significant impact on our quarterly operating results,” including $2 million in expenses for “restoration costs,” according to a release from the company. The company has … Read more

UK’s New “Cyber Security and Resilience Bill”- Strengthening Digital Defenses

UK Government Introduces Stronger Cyber Security Bill The first line delivers a message. “The first duty of this government is to keep its citizens safe,” says UK Secretary of State Peter Kyle, framing cybersecurity as a public safety issue. These words come in a new Policy paper relating to a bill designed to address the … Read more

New York State Uses Cyber Regulations to Go After Allstate Company For Repeat Breaches

Weeks after New York State announced new cyber regulations, the state’s Attorney General Letitia James has filed suit over breaches suffered by car insurer National General, now owned by Allstate Insurance. “Emboldened Hackers” “National General’s weak cybersecurity emboldened hackers to steal New Yorkers’ personal data, not once but twice in two separate cyberattacks,” said James … Read more

CyberArk, Device Authority, and Microsoft Secure IoT for Manufacturers with Zero Trust

New Collaboration Aims to Reduce Cyber Risks in Industrial IoT CyberArk, Device Authority, and Microsoft have launched a security solution to improve connected device authentication in manufacturing and secure IoT for manufacturers. The system integrates Zero Trust principles to protect industrial IoT (IIoT) and operational technology (OT) from cyber threats. Are they who they say … Read more

×