{
"author": {
"name": "Karen Hsu",
"webUrl": "/author/profile/karen-hsu/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 2,
"social": [],
"articles": [
{
"uri": "/2022/06/29/6-common-attacks-on-insurtech-and-mobile-insurance-apps/",
"title": "6 common attacks on insurtech and mobile insurance apps",
"byline": "Karen Hsu",
"kicker": "Best Practices",
"prettyDate": "June 29, 2022",
"timeToRead": "6 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/06/Mobile-app-hacked_terovesalainen.jpg",
"width": "617",
"height": "373"
},
"authors": [
{
"webUrl": "/author/profile/karen-hsu/",
"name": "Karen Hsu"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "Unprotected applications can leave policyholder and insurer information vulnerable to hackers.",
"body": null
},
{
"uri": "/2020/03/12/cyber-preparedness-in-the-boardroom-414-173972/",
"title": "Cyber preparedness in the boardroom",
"byline": "Nick Goldin and Karen Hsu Kelley",
"kicker": "Commentary",
"prettyDate": "March 12, 2020",
"timeToRead": "9 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2020/03/boardroom.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/nick-goldin/",
"name": "Nick Goldin"
},
{
"webUrl": "/author/profile/karen-hsu-kelley/",
"name": "Karen Hsu Kelley"
}
],
"kickerNode": [
{
"uri": "/commentary/",
"sectionName": "Commentary"
}
],
"summary": "Directors in 2020 should approach cyber risk from a governance and duty of oversight perspective.",
"body": null
}
]
}
}