Threat actors show no signs of slowing down. And as long as they continue to make a profit, we shouldn’t expect that to change anytime soon. Unfortunately, for all of us that aren’t actively deploying ransomware, we’re ...Read more
Welcome to another edition of our Cyber Coverage Explained series. This week, we're discussing sub-limits and coinsurance as it impacts our current market. For more coverage explainers, you can find our past posts on ...Read more
Standalone policies facilitated through a retail broker (often with the help of a wholesaler) are the bread and butter of the growing cyber market. This is especially true now as demand skyrockets for higher limits and ...Read more
Updated Monday December 13, 10:45 am ET On December 10, 2021, Apache published details of the CVE-2021-44228 vulnerability in the Log4j utility — an open source Java package managed by Apache. For background, the Log4j ...Read more
This post was originally published December 2020 and was updated in December 2021. I explained how social engineering attacks can disrupt businesses in a video that covers several common first-party insuring agreements. ...Read more
How to Identify, Attract and Retain: 3 Steps to Solve Your Cyber Talent Problem
Threat actors show no signs of slowing down. And as long as they continue to make a profit, we shouldn’t expect that to change anytime soon. Unfortunately, for all of us that aren’t actively deploying ransomware, we’re stuck playing multiple roles: technology experts, defenders, and part-time psychics.
Along with that, cyber insurers are now placing more responsibility on the policyholder’s shoulders, making certain security controls non-negotiable if you want to be insured. It benefits both parties, but there’s an obvious burden of time, expertise and finances to implement measures that boost your cyber hygiene. Our Risk + Response team talks to dozens of policyholders a month, and many are realizing that as they invest in better security measures, they’ll need the personnel to carry out their plans.READ THE BLOG