The best of R&I and around the web, handpicked by our editors.
White papers, service directory and conferences for the R&I community.
Web replica of the print magazine.
Despite the ever-rising prevalence of cyberattacks, the field of cyber insurance is still relatively new and evolving. Do you know, then, what’s inside your policy?
NotPetya malware first cropped up on computers worldwide in June 2017, setting the stage for today’s ransomware attacks and ultimately causing $10 billion in damages globally.
In order for cybersecurity insurance policies to be top notch, companies must be playing their part in mitigating cyber risk.
A session at RIMS discussed 8 cloud software megatrends and how they relate to an organization’s cyber risk.
There are several threat techniques hackers are using to infiltrate a company’s system. Understanding the difference between them is paramount.
Community associations are not immune to cyber risks and are recognizing how breaches can rob them of vital assets.
The continued conflict acts as an urgent reminder for agencies to review their cybersecurity strategies.
A recent report by Kroll details a stark increase in cyberattack occurrences from Q3 to Q4, as well as which sectors were most effected.
Is adequate risk transfer in the face of rapid technological change even possible?
IBM’s X-Force Threat Intelligence Index sheds light on where today’s cyberthreats are most prevalent and how to safeguard against them.
What should your first step even be when a hacker encrypts your data?
Anytime we pursue an opportunity, we’re taking a risk. This hypothesis is visible in the three areas of risk management where I work.
With the ongoing war in Ukraine, the conversation turns to what the cyber implications are for the rest of the world.
Theft of digital information costs companies $250 billion a year. Now is the time to get smart on protecting those intangible assets.
Companies need to have concrete and secure tools in place to fend off any cyber risk or cyber attack attempt.
The average ransomware payment has climbed 62% since 2020 and insurance appetite for the risk is waning. What is a risk manager to do?
For carriers looking to improve their identity verification ability, one-time passwords and password-free authentication are additional layers that can be added to the multi-factor authentication solutions that they’re likely already using.
Consider these four risk management tips when assessing cyber risk for middle market organizations.
This risk manager’s take is that we need to continue to focus on resiliency, not merely loss avoidance.
What is creating issues within the global supply chain and business resilience? FM Global has identified these six factors as root causes.