Latest Posts › Cybersecurity

Share:

District Courts Buck Trend on Fidelity Coverage for Social Engineering and Business Email Compromise Schemes

The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more

Cybersecurity Awareness Month: Visits From the Ghosts of Claims Past and Claims Future

Cybersecurity awareness month is nigh upon us again, and thus perspective is in order. 2016 brought us the first collection and analysis of the nascent claims history of the burgeoning cyber-insurance market. On August 27,...more

NAIC's New Cybersecurity Model Law Draft Is Still Flawed

Insurers are a prime target for hackers as a result of the vast stores of valuable data they maintain. Not all information is created equal, and it varies in value. Hacker services and software, illegal drugs, cyberweapons...more

Defining the Contours of Cyber Coverage for Data Breach: a Warning in Arizona

A year ago in this space, we looked at the receding wave of coverage litigation regarding whether various cyber-related exposures were covered under traditional policies, such as CGL and professional liability policies. ...more

Phishing for Cybersecurity Coverage: When is a Fraud a “Computer Fraud”?

In late June, the New York Court of Appeals affirmed a trial court ruling that there was no coverage for a health insurance company policyholder, under a “Computer Systems Fraud” rider issued by its insurer, for an underlying...more

Cybersecurity Coverage Litigation: Learning to Survive After the Second Wave Hits

It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more

Cyber Risk as a Regulatory Issue: Tales of Encryption

Spurred by the prescient reporting found in this space (and, just maybe, by the Anthem data breach, which occurred a week later), insurance regulators have recently engaged in a flurry of regulatory activity relating to cyber...more

Cyber Risk as a Regulatory Issue: A Connecticut Regulator Shares Her Insights

Even at Sony, cyber security was a hot topic before Kim Jong-un took an interest in Seth Rogen’s oeuvre. In 2011, hackers gained access to the personal and financial information Sony had collected on more than 100 million...more

12 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.