Underwriting & Pricing
The Importance of Soft Skills in Data Science
When most insurers think of data science in their industry, naturally it is mostly about numbers and turning abstract data into correlations that become actionable business intelligence. However, ...
Flood Insurance Program Renewal Likely in Harvey’s Wake: Key Republican
A key Republican said Hurricane Harvey will spur Congress to reach a deal to fund the nation's flood insurance program before it expires next month, even though divisions persist over how much the ...
HDI Global Insurance Forms E&S Subsidiary
Industrial insurer HDI Global Insurance Co. (HDI) has formed an excess and surplus lines subsidiary, HDI Specialty Insurance Co. The new platform will "bring European expertise and solutions" to the ...
Munich Re, Swiss Re, Hannover Re, SCOR Are Keeping Pricing Discipline in Tough Market: Fitch
The four largest European reinsurers – Munich Re, Swiss Re, Hannover Re and SCOR – have largely maintained pricing and policy terms without a significant drop in their business volumes, despite ...
Shining a Light on Dark Data
Eighty-five percent of the matter in the universe is invisible to us, and little is known about it. Scientists call it "dark matter." Dark matter interacts with the rest of the universe—in fact, ...
Opinion: Traditional Insurers Must Embrace Cyber Physical Risk
The burgeoning cyber insurance market is at a critical point of inflection. After 20 years of product evolution, with most mainstream carriers finally settling on a common core set of coverages, the ...
Socure Raises $13.9M; Insurance Industry Among Buyers of Company’s Digital ID Verification Tech
Socure, a developer of digital identity verification predictive analytics technology, raised nearly $14 million in a Series B venture financing round from backers with insurance industry investment ...
Breaking the Silence: Cyber Physical Cat Models Emerging
A frightened truck driver dodging a barrage of bullets fired from the assault rifles of a drug-smuggling criminal gang doesn't seem like the obvious description of the final stages of a cyber attack. ...

