Features
Embedded Insurance Is the Future, ITC Panelists Say
Panelists at the Insuretech Connect conference at Mandalay Bay in Las Vegas this month claimed embedded insurance is the hottest topic in the insurance industry right now. While opinions may vary, it ...
How to Get Through a Core Systems Transformation: Change Management Tips
The success of a core systems implementation is only as strong as an organization's ability to adapt to it—all while maintaining business as usual (BAU). Being proactive and flexible helps drive ...
‘Bring Your Whole Self to Work’: How Insurance Leaders Can Realize the Promise
The drive to attract, retain and develop the best talent means diversity and inclusion is a key driver and often portrayed as the centerpiece of company culture for many in the insurance profession. ...
3M Belgian Settlement Signals Increased Risk of ‘Toxic Torts’ in Europe
"Toxic torts," which are lawsuits alleging damage to human health or the environment caused by specific substances, are increasingly common in the United States. They can cost defendants hundreds of ...
Why Coterie Insurance Created a Startup Within Our Startup
As an almost four-year-old InsurTech, Coterie is no longer in the stage of trying to make our idea of simplifying the small business insurance buying process feasible. The company has been around ...
The Missing Link in Your Product Development DNA
"It is the long history of humankind (and animal kind, too) that those who learned to collaborate and improvise most effectively have prevailed." – Charles Darwin There are several customer-facing ...
13 Product Development Questions
There are a host of questions that insurance executives should ask themselves concerning product development. Here are a "baker's dozen" product development questions that could form a beginning set ...
Deeper Roots: How the Latino Community Is Strengthening the Cyber Insurance Workforce
The root level is the highest permission level of access to a computer system, and most cybersecurity professionals work hard to ensure criminals don't gain root access to a system. However, the word ...

