C-Suite Cybersecurity Disconnect, Impacting Company Value – EY Study

The vast majority of cybersecurity breaches stem from human error. Clicking phishing links or using weak passwords are common examples. But another kind of human mistake is putting companies at risk: executive misalignment on cybersecurity. New research from Ernst & Young LLP (EY US) reveals that C-suite leaders often misunderstand the scale and nature of … Read more

Lloyd’s Invests in BreachBits to Boost Cyber Insurance Innovation

Lloyd’s has made a strategic investment in cyber technology firm BreachBits through its central innovation fund. This marks the third investment from Lloyd’s Lab alumni, following BreachBits’ participation in the accelerator’s 13th cohort. BreachBits, founded by former US cyber warfare professionals, developed two automated tools aimed at enhancing cyber insurance efficiency. Lloyd’s market participants helped … Read more

Tax Day = Cyber Scam Day; Watch Out for “Smishing” and “Phishing-as-a-Service (PhaaS)”

Not long ago we reported on the threat from quishing and brushing. Now the IRS and Microsoft are advising consumers and accountancies about cyber scams linked to tax returns, including “smishing.” What are smishing cyber scams? Read on for a smishing definition. Microsoft Warns of Phishing Attacks Earlier this month Microsoft alerted cyber security professionals … Read more

Digital Healthcare Booms Amid Rising Cyber and AI Risks – CFC Report Finds

CFC, a specialist insurance provider, reports that the global digital healthcare industry is booming, driven by technology advancements and shifting patient expectations. Now, the cyber risk part. CFC’s latest Digital Healthcare Report highlights key trends shaping the sector, emphasizing the rising risks from cyber threats, AI liability, and telemedicine practices. AI Liability and Data Privacy … Read more

Coalition’s 2025 Risky Tech Ranking Lists Microsoft, Google, Apple as Most Vulnerable

Coalition Unveils Risky Tech Ranking Cyber insurer Coalition has released its first Risky Tech Ranking, identifying technology providers whose products were most vulnerable to cyber threats. The ranking is designed to help companies make safer technology choices, reduce vendor risk, and improve their cybersecurity resilience. Ranking Methodology Coalition used public data and its proprietary Coalition … Read more

×