Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Intro to Cyber Insurance: 7 Questions to Ask
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
AndyJ008
50%
50%
AndyJ008,
User Rank: Apprentice
7/15/2017 | 11:20:24 PM
Service
Great article! I like the idea that this insurance will be a less hassle and less work. The only thing that I can think is how about the services. I know for myself when I bought my insurance from JS Downey Insurance Services, the thing I look is there services and of course affordablity would come next. But if there will no changes about the  Services and reliablity I think this would be great for us as a Consumer.  
ross007
50%
50%
ross007,
User Rank: Apprentice
4/9/2017 | 10:41:57 AM
Crazy Bulk
exertion you put into your online journal great insurance 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/27/2017 | 10:29:55 PM
Risk assessments and coverage
Risk audits are par for the course for cyber insurance for mid- to large-size enterprises.  Small businesses are often only asked to fill out a questionnaire.

As for the different types of coverage, it's important to keep in mind that not every policy has all of the things mentioned (e.g., forensics), but they certainly are common.

And there are many more things "cyber insurance" can cover -- including offline data losses (such as a physical loss).  Indeed, it's not so much "data breach insurance" as it is "data loss/data compromise" insurance -- and MORE.  Another option, for instance, may be content injury liability -- such as when a hacker takes over a company's Twitter account or what-have-you and smears the company somehow.

And more.  Often, companies just have to ask their carrier or broker and/or explain what they are looking for.  (Of course, a company's staff has got to be innovative, imaginative, and experienced to intuit most of the cyber/data-related liabilities you might need covered.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/27/2017 | 10:20:55 PM
Re: business secure
@James: There are SO many different types of cyber insurance products out there.  Moreover, a lot of SMEs don't know all of their options simply because they don't think to ask.

Conversely, of course, large enterprises have a bit more leeway to negotiate exactly what they want with insurers -- and they certainly do, given the particularized needs each faces.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 3:13:12 PM
insurers are fighting
"... Because insurers are fighting to underwrite the same businesses, they're making the purchasing process less burdensome for clients."

This is a good point. They are not going to make it simple then companies would understand where they waste their money, it will be quite complex that nobody would understand.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 3:09:54 PM
Re: business secure
Yes, quite informative, I like reading it. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 2:30:04 PM
Re: business secure
"... it should be treated as an add-on to good security and compliance ..."

 I agree. Insurance would be like outsourcing responsibilities to third party and not paying attention too much.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 2:27:57 PM
Re: business secure
 " ... one-size-fits-all product ..."

I agree, it would not be but that is how insurance companies will be making profit that moves the industry to a wrong direction. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 2:25:59 PM
Cyber insurance?
I do not like the idea that we have moved to a point that we need insurance on cyber security. Anytime insurance companies involved things get very complex and expensive for regular people and business.

 
Maggy2020
50%
50%
Maggy2020,
User Rank: Apprentice
3/27/2017 | 12:39:49 AM
Re: business secure
Very interesting...thanks
Page 1 / 2   >   >>


For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17593
PUBLISHED: 2019-10-14
JIZHICMS 1.5.1 allows admin.php/Admin/adminadd.html CSRF to add an administrator.
CVE-2019-17594
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
CVE-2019-17595
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
CVE-2019-14823
PUBLISHED: 2019-10-14
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to...
CVE-2019-17592
PUBLISHED: 2019-10-14
The csv-parse module before 4.4.6 for Node.js is vulnerable to Regular Expression Denial of Service. The __isInt() function contains a malformed regular expression that processes large crafted input very slowly. This is triggered when using the cast option.