Assured's Cybersecurity Blog

8
Sep

Cybersecurity Secrets Revealed

What exactly is a software vulnerability and how do you find it? In common usage, a vulnerability is a weakness, a corner of our emotional life susceptible to a minor hurt. Vulnerabilities in deployed software are the genuine Achilles heel of our digital systems today—networks, computers, mobile devices, biometrics, even the Internet of Things (IoT).

29
Jun

Cyber Risk Beyond Compliance

The Digital Age has reached a crossroads. We have the technological means of exchanging a vast and specific array of zeroes and ones (the binary language of the digital world). Yet, hardly a day goes by without news of someone getting hacked. In fact, the loss history attributed to cyber-attacks is about $500 Billion per year. What is the insurance industry supposed to do with those numbers?

8
Jun

Assured Expands its Digital Security Platform with New Strategic Partnerships

Reinforcing Assured’s deep software scanning and organizational assessment with TeeBase’s and C3 Security’s combined technologies, along with Qafis Biometrics’ advanced identification and authorization tools, the partnership offers public and private sector organizations a top-to-bottom, face-to-code implementation of best physical and cybersecurity practices.

2
Jun

NIST Issues Guidance On Federal Government Cybersecurity Best Practices

On May 11, President Trump signed a long-delayed and much-discussed Executive Order—Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.

A day later, NIST (the National Institute of Standards and Technology) issued draft guidance—The Cybersecurity Framework—Implementation Guidance for Federal Agencies—outlining cybersecurity best practices for federal agencies.

20
Mar

Pre-Breach Cyber Risk Management for Insurance Industry

Assured Enterprises, Inc., has announced its Pre-breach Cyber Risk Management suite for Reinsurers, Insurance Companies, Captives, Program Administrators, Brokers, Agents, Insureds, Risk Managers, Underwriters, Actuaries, and Data Analysts. With increased pressure to protect data from breach, and the growing list of standards and regulations surrounding cybersecurity, risk bearers know they must address the challenge with …

27
Feb

Ground-Breaking New York State Cybersecurity Regulations Require Comprehensive, Thoughtful Response

23 NYCRR 500 New York State Cyber Regulations Another set of regulations, another set of discussions between attorneys and clients, now requiring very detailed insight into what is possible on the market from the cybersecurity engineering world: How to make the response practical, effective and valuable is, of course, the goal. Read this blog to …

15
Dec

Law Firm Liability for Inadequate Cybersecurity Just Became a Lot More Real

Companies are increasingly threatened with financial and reputational fallout from security breaches and compromised sensitive client and customer information, and a growing number of law firms are profiting from advising their unfortunate clients on how to deal with the fallout from cyber-incidents. While some well-known firms—think Cravath, Swaine & Moore and Weil, Gotshal & Manges—have …

Error: Please enter a valid email address

Error: Invalid email

Error: Please enter your first name

Error: Please enter your last name

Error: Please enter a username

Error: Please enter a password

Error: Please confirm your password

Error: Password and password confirmation do not match