Remove Consumer Protection Remove Cyber Insurance Remove Cybersecurity
article thumbnail

New York issues cyber insurance framework as ransomware, SolarWinds costs mount

CSO Magazine

On February 4, 2021, New York became the first state in the nation to issue a cybersecurity insurance risk framework to all authorized property and casualty insurers. The framework applies to all property or casualty insurers that write cybersecurity insurance.

Insurance 106
article thumbnail

CISA, SolarWinds up interest in security scoring

SC Magazine

The Cybersecurity and Infrastructure Security Agency (CISA) recently included security ratings or scoring as part of its cyber risk reduction initiative. The Cybersecurity and Infrastructure Security Agency (CISA) recently included security ratings or scoring as part of its cyber risk reduction initiative.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The CPRA: What You Should Know as an InfoSec Professional

SecureWorld News

Describing the dual-enforcement aspect of the CPRA and CCPA, with the California Attorney General and California Consumer Protection Agency having oversight and enforcement power. Enterprise endpoint protection and remediation (anti-malware, anti-virus software). Cyber insurance (critical).

InfoSec 98
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

are subject to laws such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (the HITECH Act), as well as regulations such as the Clinical Laboratory Improvements Amendments (CLIA). Financial Data Protection Laws.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Cybersecurity is on the brink of significant transformation as we approach 2025, grappling with escalating complexities driven by advancements in technology, increasing geopolitical tensions, and the rapid adoption of AI and IoT. Cyber threats often exploit human errors, whether through phishing attacks, weak passwords, or lapses in protocol.