All Risk News articles – Page 151
-
Analysis
Insurers urged to set standards for covering drones – an insurance market potentially worth billions
Insurance potential is huge but underwriters must shape safety laws
-
Analysis
Leaving cyber security to IT experts alone is a gamble directors cannot afford to take
In the event of a major data breach, directors are likely to face legal action, having to prove they did everything they could to take cyber risk seriously Part of a technology risks series supported by
-
Analysis
How AIG is using Big Data to identify vulnerabilities in the supply chain
High-quality information is the risk manager’s friend in need as it helps them to analyse potential loss more effectively Part of a property and casualty risks series supported by
-
Analysis
Zurich mulls over buying rival insurer RSA
Zurich has until 25 August to announce a bid or withdraw from purchasing the business, estimated to be worth £5.5bn
-
Analysis
A round-up of July’s top risk management news and analysis
Read this month’s top stories in our latest digital digest. This edition features video interviews with JLT, Marsh, FM Global and ACE; and we find out what the latest string of insurer M&A activity means for risk managers.
-
Analysis
The insurers that are developing drones insurance and the risks they are covering
Demand for drones insurance is high with oil and gas and media industries investing heavily in the technology
-
Analysis
How France’s new class actions regime will benefit business
Consumers can now enjoy better protection and duplication of lengthy cases will also be avoided Part of a property and casualty risks series supported by
-
Analysis
Why manufacturers in Germany and France are turning to 3D printing
From bottles to complicated prosthetics, 3D printing is revolutionising all aspects of manufacturing but the technology is posing significant challenges for insurers Part of a property and casualty risks series supported by
-
Analysis
Hackers are using clever tricks to convince staff to reveal company secrets
When it comes to managing cyber risks, businesses often overlook one key vulnerability –their employees Part of a technology risks series supported by
-
Analysis
Axa in $519m takeover talks with Genworth
Deal would create third-largest European creditor insurer
-
Analysis
Cyber risk among the top 10 concerns for insurers globally
Regulation, macro-economy and interest rates are also highlighted as key challenges for insurers
-
Analysis
Globalised supply chains and regulatory changes cause food recalls to double
Some 52% of all food recalls cost US companies more than $10 million
-
Analysis
Risks and rewards of artificial intelligence
Advances in artificial intelligence, synthetic biology, nanotechnology and robotics promise a new start for the human race – if it learns to understand the risks, that is Part of a technology risks series supported by
-
Analysis
The future’s driverless, or is it?
To their champions, autonomous vehicles herald a revolution on the roads – but safety and security worries are mounting Part of a technology risks series supported by
-
Analysis
How can risk managers reduce claims numbers?
Improved risk management and enhancing claims defensibility can help win the battle
-
Analysis
EU updates air safety list and lifts Philippines ban
A total of 232 airlines are banned from flying in the EU and passengers can use the list to check airline safety when traveling in other parts of the world
-
Analysis
EU agrees revised directive on insurance sales
The new rules will change the way in which insurance products are sold
-
Analysis
Business risk: public liability in the UAE may no longer remain “litigious-lite”
Companies in the region should not expect the legal environment to stay the same Part of a property and casualty risks series supported by
-
Analysis
The next big cyber threat will come in the form of ransomware
Ransomware – whereby criminals steal data and threaten to destroy it unless demands for money are met – is a key strategy for hackers, but risk managers can take steps to prevent such attacks Part of a technology risks series supported by