Columns

Four Situations to Avoid to Keep Supply Chain Costs in Check

Four Situations to Avoid to Keep Supply Chain Costs in Check

A robust supply chain helps an organization respond to disruptions from transportation delays, labor disputes, natural disasters and other events.

 
Oroville Dam Highlights Infrastructure Risks

Oroville Dam Highlights Infrastructure Risks

The near-collapse of a California dam underlines the perils of decaying infrastructure.

 
The Real Risks of Fake News

The Real Risks of Fake News

Fake news stories and misinformation can waste valuable time and resources.

 
W-2 Phishing Scam Targets Tax Season

W-2 Phishing Scam Targets Tax Season

Fraudsters are using business email compromise techniques to steal W-2 information.

 
Determining the Arbitration Obligation

Determining the Arbitration Obligation

Policyholders are often surprised to find that their policies require arbitration for disputes.

 
Q&A: Bridging the Gaps at PayPal

Q&A: Bridging the Gaps at PayPal

PayPal’s Laura Langone discusses cyber insurance and the role of education in the buying process.

 
Notepad: Risk in Review – April

Notepad: Risk in Review – April

Hacking stuffed animals, a new cybersecurity law, corporate reputation rankings and more.

 
The Cyber Insurance Obstacle Course

The Cyber Insurance Obstacle Course

A number of obstacles facing both insurers and consumers could explain why the market for cyber insurance has not been stronger.

 
Death to Buzzwords

Death to Buzzwords

Banning meaningless jargon to concentrate on real ideas rather than packaging.

 
Only Humans Can Prevent Wildfires

Only Humans Can Prevent Wildfires

A study of wildfires in the United States found that the number of blazes caused by humans is much higher than previously believed.

 
BYOD Risk Meets IoT Reality

BYOD Risk Meets IoT Reality

Enterprises struggle to understand just how vulnerable they are to the risks introduced by connected devices in the workplace.

 
Five Critical Security Considerations for Working with Third-Party IT Vendors

Five Critical Security Considerations for Working with Third-Party IT Vendors

To help ensure that the proper safeguards are in place to have a secure and productive relationship with its third-party IT vendors, companies should consider a five-point checklist.

 
How to Create a Cyber-Savvy Corporate Culture

How to Create a Cyber-Savvy Corporate Culture

When it comes to cybersecurity, the conversation normally focuses on technology, policies and processes. But too often these discussions overlook a critical component: people.

 
Best Practices to Prevent Data Breaches

Best Practices to Prevent Data Breaches

These recommendations can help companies and individuals protect their assets and operations from data breaches.

 
Understanding the Benefits and Risks of Blockchain

Understanding the Benefits and Risks of Blockchain

Blockchain presents some clear opportunities, especially for insurance, but as with any new technology, it is not without its risks.