The best of R&I and around the web, handpicked by our editors.
White papers, service directory and conferences for the R&I community.
Web replica of the print magazine.
Sony's failure to adequately invest in cyber defense is a good lesson for all of us.
Brokers can play a key role in helping insureds get a grip on cyber risk.
Unpatched software remains a top cyber vulnerability. Low-tech "phishing" attacks continue to succeed.
There are valuable lessons to be gleaned from approaching cyber risk as you would an active volcano.
It's time to consider whether cyber coverage is evolving and maturing at the same pace as the exposures it's designed for.
Weak firewalls for home IoT networks mean your toaster could betray you.
Younger brokers play an important role in helping insureds understand cyber risks.
Security researchers provide haunting proof of how vulnerable our high-tech vehicles really are.
In resolving cyber security dilemmas, it helps to ask the right question.
Find the right balance between mitigating and transferring cyber risk to maximize ROI and validate your approach with the C-suites and the board of directors.
The aggregated impact of a cyber attack on the U.S. power grid could cause huge economic losses and upheaval.
Captives are emerging as a viable option for cyber coverage when the commercial marketplace lacks affordable options.
The Consumer Financial Protection Bureau recently levied a fine in the cyber security realm. It sent a clear warning.
Personal liability judgments against the very rich escalated in monetary value over the past 20 years.
Disarming Apple's "wiper" feature will lead to even bigger trouble.
Risk managers struggle and succeed in placing cyber coverage.
If cyber insurance is going to respond to a ransomware incident, close cooperation with the carrier is necessary.
Captives offer customized solutions, but quantifying cyber risk is a challenge.
The disruptive influence of evolving risks has the potential to drive innovation in the insurance industry and beyond.
We prize speed and efficiency on the Internet. We ignore the security blind spots at our peril.