To cure their woes, the bug bounty industry should look no further than risk pooling. To cure their woes, the bug bounty industry should look no further than risk pooling. (Photo: Shutterstock)

As the political climate heats up, so does the new era for cyberwarfare. In recent history, nation states supplemented military conflict with attacks on digital infrastructure to either gather intelligence or cause outages, but now with their high impact and versatile usage, there is more reason to include cyber attacks not only before, but during and after conflicts. Actually, there is no reason to stop. In order to maximize effectiveness, cyber attackers target not only government-owned equipment, but banks, transport and infrastructure to cause damage. Securing one set of systems is already a challenge, and now we have a problem of securing an entire nation's systems.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.