Toggle navigation
Data
Media
Advisen News
Events
Executive Articles
Guides & Reports
Media Kit
Surveys
Webinars
White Papers
WCL
Resources
About Us
Who we are
Leadership
Press Releases
Advertise with Advisen
Privacy Policy
Contact Us
|
Client Login
Data
Media
Advisen News
Events
Executive Articles
Guides & Reports
Media Kit
Surveys
Webinars
White Papers
WCL
Resources
About Us
Who we are
Leadership
Press Releases
Advertise with Advisen
Privacy Policy
Home
2014
December
December 2014
2014 by the numbers: record-setting cyber breaches
Chick-fil-A investigating suspected data breach
Cyber attacks in 2015 likely to expand, change in scope
Vendor roles before, during and after data breaches need nailing down
XL Cyber & Tech reveals team of breach response specialists
Storage of data just as significant as other risks; RMs looking for products
Consumer lawsuit against Target allowed to proceed
Cramsie moves from Aon to Beazley’s TMB unit
Kang joins The Hartford as cyber products manager
Staples acknowledges data breach at 115 stores
FBI: North Korea responsible for Sony cyber attack
No rest seen from flow of data breach litigation in 2015
Cyber brokers’ 2015 outlook: Insurers to revisit books, raise rates
Not just about accounting anymore: E&O coverage takes on data privacy, loss
Monitoring credit takes more than “credit monitoring”
Snapchat data breach: A case study
Congress ends session without renewing TRIA; insurance industry ‘reeling’
Report finds Sony Pictures’ cyber insurance will likely be drained (blog)
Sony Pictures tells employees all info may have been stolen in massive breach
Congress passes series of cybersecurity bills
Opportunity to revisit cyber terrorism in TRIA?
McAfee pegs cyber espionage as one of top threats in 2015
Healthcare/Pharma in the cyber crosshairs in 2015
Employees, vendors, corporate culture tops among today’s cyber risks
US deepens data sharing with banks to deflect cyber threats
2014 the ‘year everything changed’: Coalfire
The importance of a battle-tested incident response plan
NIST: Some using cybersecurity framework as benchmark, some avoiding it
1
2
>
»