Wearables in Insurance: Balancing Value and Vulnerabilities

Security vulnerabilities exist in a number of areas; data sent from a wearable device to a nearby smartphone, for example, may be exposed during transfer via Bluetooth or WiFi connections.

To continue, please sign in or become a member.
Join the INN community
MEMBERSHIP IS FREE
  • Full access to the industry's most comprehensive daily report, including news, analysis and insight.
  • Daily, weekly, and topic-based newsletters and alerts.
  • Web seminars, white papers, and research from authoritative contributors.
Have an account?
SIGN IN HERE
Remember me Forgot password?

SlideshowsSee All »
VideosSee All »