Beyond the Phish: Why Routine Software Updates are the New Cyber Frontier

Guest Author: Jonathan Selby, Technology Vertical Lead, Founder Shield. Most of us fear the “bad link” in a fake email, and we diligently train our teams to spot fishy notes. But what if the threat comes from a tool you already trust? The recent hit on Notepad++ shows a new trend—hackers got into the system … Read more

Protect Your Brand, Not Just Your Data: The Critical Role of ERM in Cyber Risk

A cyber breach can hit in seconds, but the damage to your brand can last for years. That is why ERM in cyber risk is becoming essential for businesses looking to protect not just their data, but their reputation. According to the most recent Identity Theft Resource Center Business Impact Report, 81% of small- to … Read more

European Cybersecurity M&A Gains Momentum As Threats And Regulation Rise

Recent White & Case commentary focuses on European cybersecurity M&A, which is important because, while the focus is regional, the threat is global. Cybercrime and state-backed attacks move quickly across borders, and malware is not stopped by customs. This makes the European deal landscape relevant beyond the region. White & Case notes that cyberattacks in … Read more

Cyber Warfare Escalates Worldwide As AI Turns Digital Conflict Into Constant Pressure

Cyber warfare sits just beyond the traditional edges of the cyber insurance beat, yet its consequences land squarely inside it. Political conflict drives economic disruption. Digital attacks trigger the losses insurers eventually absorb, from business interruption to infrastructure failures and cascading supply-chain damage. Carl von Clausewitz wrote that “war is merely the continuation of policy … Read more

Tax Identity Theft: Why a Seasonal Scam Has Become a Year-Round Cyber Risk

By Michael Scheumack, Chief Innovation Officer, IdentityIQ Tax season is no longer just a deadline. It is a prime opportunity for cybercriminals to turn stolen personal data into quick financial gain. Tax identity theft occurs when a criminal files a fraudulent tax return using someone else’s personal information to claim a refund. With just a … Read more