Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Intro to Cyber Insurance: 7 Questions to Ask
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
AndyJ008
50%
50%
AndyJ008,
User Rank: Apprentice
7/15/2017 | 11:20:24 PM
Service
Great article! I like the idea that this insurance will be a less hassle and less work. The only thing that I can think is how about the services. I know for myself when I bought my insurance from JS Downey Insurance Services, the thing I look is there services and of course affordablity would come next. But if there will no changes about the  Services and reliablity I think this would be great for us as a Consumer.  
ross007
50%
50%
ross007,
User Rank: Apprentice
4/9/2017 | 10:41:57 AM
Crazy Bulk
exertion you put into your online journal great insurance 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/27/2017 | 10:29:55 PM
Risk assessments and coverage
Risk audits are par for the course for cyber insurance for mid- to large-size enterprises.  Small businesses are often only asked to fill out a questionnaire.

As for the different types of coverage, it's important to keep in mind that not every policy has all of the things mentioned (e.g., forensics), but they certainly are common.

And there are many more things "cyber insurance" can cover -- including offline data losses (such as a physical loss).  Indeed, it's not so much "data breach insurance" as it is "data loss/data compromise" insurance -- and MORE.  Another option, for instance, may be content injury liability -- such as when a hacker takes over a company's Twitter account or what-have-you and smears the company somehow.

And more.  Often, companies just have to ask their carrier or broker and/or explain what they are looking for.  (Of course, a company's staff has got to be innovative, imaginative, and experienced to intuit most of the cyber/data-related liabilities you might need covered.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/27/2017 | 10:20:55 PM
Re: business secure
@James: There are SO many different types of cyber insurance products out there.  Moreover, a lot of SMEs don't know all of their options simply because they don't think to ask.

Conversely, of course, large enterprises have a bit more leeway to negotiate exactly what they want with insurers -- and they certainly do, given the particularized needs each faces.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 3:13:12 PM
insurers are fighting
"... Because insurers are fighting to underwrite the same businesses, they're making the purchasing process less burdensome for clients."

This is a good point. They are not going to make it simple then companies would understand where they waste their money, it will be quite complex that nobody would understand.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 3:09:54 PM
Re: business secure
Yes, quite informative, I like reading it. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 2:30:04 PM
Re: business secure
"... it should be treated as an add-on to good security and compliance ..."

 I agree. Insurance would be like outsourcing responsibilities to third party and not paying attention too much.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 2:27:57 PM
Re: business secure
 " ... one-size-fits-all product ..."

I agree, it would not be but that is how insurance companies will be making profit that moves the industry to a wrong direction. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/27/2017 | 2:25:59 PM
Cyber insurance?
I do not like the idea that we have moved to a point that we need insurance on cyber security. Anytime insurance companies involved things get very complex and expensive for regular people and business.

 
Maggy2020
50%
50%
Maggy2020,
User Rank: Apprentice
3/27/2017 | 12:39:49 AM
Re: business secure
Very interesting...thanks
Page 1 / 2   >   >>


Cybersecurity Industry: It's Time to Stop the Victim Blame Game
Jessica Smith, Senior Vice President, The Crypsis Group,  2/25/2020
Google Adds More Security Features Via Chronicle Division
Robert Lemos, Contributing Writer,  2/25/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9431
PUBLISHED: 2020-02-27
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
CVE-2020-9432
PUBLISHED: 2020-02-27
openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9433
PUBLISHED: 2020-02-27
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9434
PUBLISHED: 2020-02-27
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-6383
PUBLISHED: 2020-02-27
Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.