Quantcast
Channel: Tech Insurance Small Business Center - Risk ManagementTech Insurance Small Business Center0.0000000.000000
Browsing all 226 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Old Is the New New in Technology Startups

We've been hearing so much about the "new" economy where companies use freelancers and independent contractors to build a flexible workforce. But as the New York Times reports, some tech companies and...

View Article


Image may be NSFW.
Clik here to view.

http://www.techinsurance.com/blog/cyber-liability/hackers-admit-targeting-lax...

A funny thing happened after hacker collective Rex Mundi stole 24,000 records from Belgian loan company AFC Kredieten. The hacking group explained what they look for in a data breach victim. As The...

View Article


Image may be NSFW.
Clik here to view.

Hackers Admit Targeting Lax Security, Shoddily Built Applications

A funny thing happened after hacker collective Rex Mundi stole 24,000 records from Belgian loan company AFC Kredieten. The hacking group explained what they look for in a data breach victim. As The...

View Article

Image may be NSFW.
Clik here to view.

http://www.techinsurance.com/blog/consultant-liability/four-in-five-web-apps-...

A recent Acunetix study of over 15,000 websites and 5,500 companies unveiled startling numbers. Network scans performed on over 1.9 million files revealed that…Almost four in five web applications were...

View Article

Image may be NSFW.
Clik here to view.

Holy Cripes! 4 in 5 Web Apps Have "Medium Security" Vulnerability

A recent Acunetix study of over 15,000 websites and 5,500 companies unveiled startling numbers. Network scans performed on over 1.9 million files revealed that…Almost four in five web applications were...

View Article


Image may be NSFW.
Clik here to view.

http://www.techinsurance.com/blog/cyber-risk/the-lack-of-a-federal-data-breac...

The National Law Review reports that two states – Connecticut and Rhode Island – have updated their data breach laws to require a more stringent breach response. Both include changes to specify a set...

View Article
Browsing all 226 articles
Browse latest View live