Search Results for "cyber insurance"

Verizon: 5 Billion Business IoT Connections by 2020

    In-brief: A report by Verizon finds business adoption of IoT is growing quickly, boosting that company’s Internet of Things numbers. But increased business adoption of IoT brings risks to privacy and security.

At Electronics Bash, FTC Chairwoman Calls for Privacy, Security on IoT

  The Wall Street Journal reports on an address that FTC Chairwoman Edith Ramirez gave to the folks out at CES, the Consumer Electronics Show, in Las Vegas. From the report: “Ramirez outlined several concerns including ubiquitous data collection, or the ability of sensors to collect sensitive personal information about consumers all the time and in real time; unexpected uses of consumer data, such using individual energy use patterns to set their homeowners’ insurance rates; and cybersecurity threats. “She also noted opportunities. ‘Whether it’s a remote valet parking assistant, which allows drivers to get out of their cars and remotely guide their empty car to a parking spot; a new fashionable bracelet that allows consumers to check their texts and see reviews of nearby restaurants; or smart glucose meters, which make glucose readings accessible both to those afflicted with diabetes and their doctors, the IoT has the potential to transform […]

Report: AdWords Fraudbot Helps E-Commerce Firms Compete

One of the more interesting stories to come out this week is from Brian Krebs over at Krebsonsecurity.com. Writing on Friday, Krebs used his prodigious knowledge of the cyber underground to profile “GoodGoogle,”  one of a growing number of specialized online fraud services that helps e-commerce firms target competitors by gaming Google’s AdWords feature. As you probably know, AdWords are one of Google’s biggest sources of revenue. They allow companies with products or services to sell to “bid” on words or phrases (like “Internet of Things”). Users who search on those terms will see hyperlinked ads to the right of their search results that link to a site of the advertiser’s choosing. Advertisers pay a premium to own popular (and lucrative) keywords – more than $40 per click for keywords like “loan,” “insurance,” “mortgage” or “attorney” depending on the word and time of day. Typically, advertisers set a certain daily budget […]

Google Autonomous Vehicle

When Autonomous Vehicles Crash, Is The Software Liable?

Many industries are wrestling with the blinding speed of technologic change. Mobile devices like smartphones and tablets are transforming the way employees work and customers interact with a business. And that doesn’t even take into account the (coming) revolution of smart devices and remote sensors that is referred to as The Internet of Things. But few industries are wrestling as hard with the implications of that change as the Insurance industry, which must assess the long-term impact of huge forces like technology innovation or, say, climate change on risk. One example: how will the advent of autonomous vehicles or even computer augmented driving change the auto insurance business? And, when two computer-guided cars crash, who (or what) is liable? Those were some of the questions posed to attendees at this week’s Emerging Technology (or EmTech) Conference at The Massachusetts Institute of Technology (MIT). The speaker, Joe Coray, is the Vice […]

BitSight: A Equifax For Security Risk?

I’ve opined in these pages and elsewhere that one of the big problems in the IT security space is the absence of actionable data. After all, problems like denial of service attacks, network compromises and inadvertent data leaks are all just risks that organizations and individuals must grapple with in our increasingly wired world. True – they’re new kinds of risks, but otherwise they’re not fundamentally different from problems like auto accidents, property crime or illness – things  that we do a good job accounting for. The difference, as I see it, is an absence of accepted and independent means of assessing the relative security posture of any organization. IT security is still so much dark magic: we rely on organizations to tell us about how secure they are. Organizations, in turn, rely on a complex and patchy network of security monitoring and detection tools, then try to read the […]