The best of R&I and around the web, handpicked by our editors.
White papers, service directory and conferences for the R&I community.
Web replica of the print magazine.
Trade dynamics are complex and interconnected.
Background checks and monitoring property — like laptops lent by the company — can deter and prevent crimes committed by employees.
How many risk prevention and mitigation techniques are designed around the triangle rule?
More than one quarter of embezzled funds are taken from within.
It’s incumbent upon risk managers to understand exactly what their agents are doing — or not doing — on their behalf.
A look at the latest decisions impacting the industry.
Chubb’s fine arts team takes pride in returning a treasured piece of art to a Philadelphia-area family.
A look at the latest legal cases impacting the industry.
Amateur sports leagues are prime victims when it comes to embezzlement, but there are coverages and risk management strategies that can help limit loss.
A new class of cyber criminals is targeting companies’ private information.
Inhospitable work environments encourage some workers to rationalize committing insurance fraud.
Fraudulent whiplash claims after a motor accident run rampant in the UK.
Most company fraud is carried out by employees.
Long supply chains offer criminals ample opportunities to sneak in counterfeit drugs, which pose a serious risk to public health.
Encrypted DNA can track stolen artwork as well as be used for authentication purposes.
Fraud impacts the majority of U.S. companies annually.
According to a recent survey, a significant number of small employers don’t feel confident in their ability to identify workers’ comp fraud.
The new wave of “social engineering” scams by cyber fraudsters is costing corporate America billions. The best defense is education and collaboration.
Report highlights damage done by employee theft and fraud to smaller employers.
Fraud at nonprofits can result in devastating reputational harm.
Old ploys and process deficiencies impact 2014 data breach attack numbers.