All Technological Risk articles – Page 9
-
AnalysisIoT unlocks the door to hackers
Businesses need to wise up to security flaws as they embrace the Internet of Things
-
AnalysisHow AI will impact on risk management
AI has the capacity to transform processes and reveal unknowns
-
AnalysisThe risks and opportunities of blockchain
Blockchain is transforming financial services but its potential as a business enabler is much wider
-
AnalysisAI: Friend or foe?
Robots can help fill the skills gap in cyber security, but what if the AI system itself gets hacked?
-
AnalysisHow to comply with the EU data protection regulation
Businesses are not yet ready for GDPR, but these three steps will ensure compliance from an IT perspective
-
AnalysisCyber security controls ‘not fit for purpose’
New white paper questions the value of compliance to risk control standards
-
AnalysisWho’s afraid of the big, bad robots?
The rise of machines threatens the jobs of manual workers and professionals alike, and could conceivably lead to widespread civil unrest. But among the experts, not everyone is pessimistic
-
AnalysisInformation warfare: the rising threat of state-backed cyber attacks
The high level of engineering behind nation-sponsored hacks makes it hard for businesses to protect themselves
-
AnalysisSurviving a cyber attack
Cyber-related issues are the biggest potential threat to businesses and represent the most lethal challenge to resilience
-
AnalysisYahoo cyber attack ‘largest data breach to date’
500 million users’ data including names, addresses and passwords have been stolen in Yahoo cyber attack
-
AnalysisEuropean businesses underestimate cyber risk
New research finds corporates underestimate the likelihood and potential impact of a cyber attack
-
AnalysisDelta’s costly IT-outage highlights importance of business continuity plans
The five-hour IT outage cost the US airline approximately $150m
-
AnalysisGuide to: cyber risks
Cyber crime used to be a rarity, with physical break-ins par for the course, but the new breed of highly sophisticated criminal makes the swiping of data tapes seem quaint. In this guide, we look at the evolving cyber risk landscape
-
AnalysisThe Knowledge: risk management information systems
StrategicRISK’s latest survey shows 82% of risk managers use an RMIS. What are the systems’ standout strengths and weaknesses, and what does the future hold?
-
AnalysisDriverless cars will need cover against cyber attacks
Insurers will need to adapt to a new range of risks presented by hackers, AXA says
-
AnalysisAlmost two thirds of firms don't have cyber insurance – survey
Many companies are also unsure whether their cyber insurance policy is up-to-date
-
AnalysisSwiss Re CS launches UK-specific cyber cover
The new product combines insurance with risk mitigation and remediation services
-
AnalysisStrategicRISK Europe Q2 now live
In Q2 edition of StrategicRISK, we look at Europe’s political landscape in light of the growing migrant crisis and recent terror attacks in Paris and Brussels, the face-off between Hillary Clinton and Donald Trump, and speak exclusively to Chubb, senior vice-president Andrew Kendrick in his first interview since the ACE-Chubb ...
-
AnalysisABI calls for compulsory cyber attack database
A lack of hard data on cyber attacks is making it hard for insurers to provide appropriate cover, the association says
-
AnalysisGuide to technology risk
This guide reviews some of the major current technological developments and assesses how they might benefit, disrupt or threaten large corporate businesses around the world





