Episode one of Insurance & Artificial Intelligence: How do AI and internet of things impact the insurance industry? (From Argo Group)

A world of data available today is creating changes in commerce — including the insurance industry.
For those involved in risk assessment, new data techniques […]

From LexisNexis: China’s Internet Banking Industry Exploding — Can They Have Global Success? Can U.S. Companies Have Success in China?

China’s FinTech industry is way ahead in Asia, and the volumes rival some of the world’s biggest banks. The Chinese never really embraced plastic […]

From Kivu: What Real-Life Kidnappings Can Teach us About Dealing with Digital Ones

Excerpt from article by Alyssa Newcomb of NBCNews.com

Kidnappings for ransom have been dramatized on television and in the movies and detailed on the new. […]

From McDonald Hopkins: What you can learn from Google Docs email scam

Excerpt from post by Christine N. Czuprynski of McDonald Hopkins
A malicious phishing virus that impersonated Google Docs was discovered and quickly shut down […]

From Marsh: Should Cybersecurity Be a Catch-All for Disruptive Tech Risks?

Excerpt from an article by Thomas Quigley, Communications, Media & Technology, US Practice Leader, Marsh
The mention of disruptive technology risks often spurs a laser […]

From RSA: The GDPR & Your Data Protection Obligations

Excerpt from the RSA blog:
The focus is growing for the European Union’s forthcoming “General Data Protection Regulation,” or GDPR. As its May 25, 2018 […]

The Hiscox Cyber Readiness Report Ready for Download

Photo credit: Hiscox

“Robust defences against cyber intruders and strong processes for eliminating careless or rogue behaviour internally are now the keys to business continuity […]

From Travelers: Data Management Tips for Business Continuity

Photo credit: Travelers.com

When you think “business continuity,” you should think about your data and networks as well as your employees, customers and property. Financial […]

Sedgwick LLP: Ransomware – a Global Wake-Up Call

U.S. Regulator Warns of “Evidence” of Global Cyber Assault Occurring Inside the U.S. and Steps Your Company Should Take Against a Ransomware Attack 
On Friday, May […]

NPR Report on Lead (Pb) Dust Hazard from Firearms

From the May 10 article by Angus Chen for NPR

Photo credit: HB Litigation Conferences LLC
“In a standard bullet, a solid lead core wrapped in a copper […]

Minerva Labs Discusses Its Role in the War on Malware

From ‘Evasive Techniques: An Introduction,’ a 2016 whitepaper from Minvera Labs. The company’s Co-Founder and VP of Research, Omri Moyal, is speaking on the ‘Cloud […]

From Lien Resolution Group: J&J Hit With $110M Verdict After Jury Finds Talc Powder Caused Woman’s Cancer

Photo Credit: facingsouth.org
Lien Resolution Group, frequent speakers and sponsors of HB events, breaks down the $110M verdict.
ST. LOUIS — A Missouri state court jury this month awarded […]

Allianz Press Release: “Risk Barometer 2017”

 “Companies greatly fear the impact of rising protectionism and other potential shocks to markets.
Business interruption continues to lead risk rankings as new non-physical damage […]

Webinar on Protecting Personal Injury Settlements Now on West LegalEdcenter

Now is the time to protect your client’s settlement proceeds.
When personal injury cases settle your client might think the process has successfully come to […]

Top Ten Practice Pointers for Dealing with E-Discovery by Carolyn Purwin Ryan

Warnings and best practices in dealing with e-discovery are outlined in a recent article by Carolyn Purwin Ryan, a partner in Cipriani & Werner’s Philadelphia office. […]

Online and Under Attack: What Every Business Needs To Do Now To Manage Cyber Risk and Win Its Cyber War

In his recently published book, John Farley dives deep into the hacker underworld to provide insight into the ways cyber attacks are carried out and […]

Crypsis: “Splunkomen — Taking the Sysmon to the Next Level”

“The success of security teams when combating cyber threats relies on visibility into the environment they must defend. Security teams that do not have […]