Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
January 5, 2024
What is Cyber Attack Insurance? Best Practices for Protection
Businesses of all sizes are becoming increasingly reliant on technology to conduct their operations efficiently. While technology offers numerous benefits, it also exposes organizations to growing digital threats, including phishing attacks, malware infections, and sophisticated social engineering campaigns. As the frequency and sophistication… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
January 5, 2024
Risk Management in Healthcare: Definition & It’s Importance
The healthcare industry is no exception to the rapid levels of transformation we’re seeing across multiple industries right now. As more facilities begin to leverage electronic health records (EHRs) and internet-connected medical devices for patient care, organizations are becoming more reliant on advanced technologies. While these changes have helped advance… Read More
Healthcare
Tech Center
January 4, 2024
The Most Important Security Metrics to Maintain Compliance: Best Practices for Prioritizing Cyber Resilience
With the recent surge of high-profile data breaches, supply chain vulnerabilities (SolarWinds, Log4j, and MOVEit, most notably), and targeted cyberattacks, the digital world is becoming increasingly precarious. At the same time, consumers are increasingly sharing sensitive data with companies in exchange for convenience and efficiency. For these reasons, organizations have a growing… Read More
Security Ratings
Tech Center
January 2, 2024
How to Perform A Cybersecurity Risk Analysis in 2024
Risk analysis is defined as the process of identifying, reviewing, and analyzing any existing or potential cybersecurity risks that could negatively impact a business. Performing a cybersecurity risk analysis helps your company identify, manage, and safeguard data, information, and assets that could be vulnerable to a cyber attack. Such an analysis… Read More
Tech Center
December 14, 2023
Optimizing Incident Response with Advanced Threat Intelligence
In today’s cyber landscape, rapid and effective incident response is crucial for organizations to mitigate the impact of cyber attacks. Advanced Threat Intelligence (ATI) is emerging as a key player in enhancing incident response strategies. This blog post aims to elucidate how modern threat intelligence tools refine and improve these strategies, equipping… Read More
Cyber Threat Intelligence
Tech Center
October 11, 2023
Zero‑Day Attack Prevention: How to Prepare
In the world of cybersecurity, zero-day vulnerabilities, zero-day attacks, and zero-day exploits keep many CISOs up at night. These terms, often shrouded in mystery and intrigue, denote a significant risk to digital systems and the sensitive data they hold. Understanding the intricacies of zero-day vulnerabilities and the exploits that leverage them is crucial… Read More
Tech Center
September 20, 2023
What is the Cost of Cyber Liability Insurance?
In today’s digital age, where businesses rely heavily on technology and data, the risk of cyberattacks and data breaches has become a constant concern. These incidents can lead to significant financial losses, damage to a company’s reputation, and even legal liabilities. To mitigate these risks, many businesses turn to cyber liability insurance. But… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
July 12, 2023
What is Cyber Threat Hunting?
Cyber threat hunting is a proactive security strategy that involves searching for threats within a network before they can cause significant damage. Unlike traditional methods, which are reactive and wait for an alert before taking action, threat hunters seek to actively identify and mitigate hidden threats that have… Read More
Cyber Threat Intelligence
Tech Center
April 12, 2023
7 Factors that Drive Cyber Risk: New Research from Marsh McLennan and SecurityScorecard
The expanding attack surface of an increasingly interconnected digital world comes with a high degree of risk due to ransomware, phishing attempts, supply chain attacks, data breaches, and other cyber incidents. And while many organizations recognize the need for cyber insurance, a recent Forrester Research report found that only 55%… Read More
Cyber Insurance
July 20, 2022
5 Steps to Selecting a Vendor Risk Management Framework
Third parties are an inevitable and essential part of your business ecosystem. They’re your vendors, partners, and contractors. They improve efficiency, extend your reach, and make it possible to deliver the best possible products and services. From a security perspective, however, they also bring a significant amount of risk. Read More
Tech Center
June 24, 2022
Top 5 Incident Response Best Practices You Should Follow
When it comes to cybersecurity, organizations need to be well-prepared for what comes next. Cybercriminals are constantly adapting to their targets, retooling and updating their tactics, techniques, and procedures (TTPs) to break in despite built-up defenses. And costs are rising. The… Read More
Tech Center
June 24, 2022
What is Digital Forensics? Everything You Need to Know: How It Supports Cybersecurity, Incident Response, and Compliance
Digital forensics refers to the recovery and investigation of material found in digital devices that may be evidence of crimes. As society becomes more and more reliant on computer systems, digital forensics has become a critical facet for law enforcement agencies and… Read More
Tech Center
June 22, 2022
What is Vendor Tiering? Tips to Improve Your Vendor Risk Management
Over the last few years, supply chain attacks have increased in number and sophistication. As companies accelerate their digital transformation strategies, managing third and fourth-party risk and a complete look into their security posture becomes more important to securing data and meeting mission-critical compliance requirements. According to one survey, … Read More
Tech Center
March 7, 2022
Understanding the Basics of Cyber Insurance: What You Need to Know
Data breaches and cybercrime are all too common. And in recent years, ransomware attacks have caused many organizations to face hefty extortion payments, legal fees, and reputational damage – not to mention the major headache that comes with each. Cyber insurance has become a powerful tool in the world of… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
March 2, 2022
What is Cyber Hygiene? Definition, Benefits, & Best Practices
You’ve likely been practicing good personal hygiene since childhood, but have you heard of cyber hygiene? Similar to personal hygiene practices, which maintain good health and well-being, cyber hygiene practices maintain the health and well-being of your sensitive data and connected devices. This blog will define… Read More
Tech Center
February 7, 2022
6 Benefits of Effective Risk Management in Cybersecurity
Cyber attacks are major threats to organizations and industries across the board. And as technology advances, cybersecurity continues to be the focus that requires serious attention. However, many have weaknesses and gaps in their cybersecurity strategy. Common weaknesses can include the failure to identify and mitigate risks, as well… Read More
Tech Center
December 6, 2021
First-Party vs Third-Party Cyber Insurance: What’s the Difference?
Often it’s not a question of if your business will experience a data breach, but when. Hackers are always looking for new ways to take advantage of weak networks or trick employees into falling prey to their schemes. And if your business operates computer systems or handles sensitive data regularly,… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
November 24, 2021
Guide to Performing a Data Risk Assessment
Most companies know how to engage in a security risk assessment. However, the first step in the security assessment process should be engaging in a data risk assessment. While the two sound similar, they provide different insights. This guide to performing a data risk assessment explains what… Read More
Tech Center
November 11, 2021
What are Information Security Controls?
The possibility of a data breach at your organization can be anxiety-inducing. According to the Ponemon Institute, the average cost of a data breach is $3.61 million, and it’s on the rise; the average data breach cost is up 10% over last year and remote work is… Read More
Tech Center
October 6, 2021
Assessing Cyber Risk: 13 Critical Questions for the Board
Boards of Directors constantly need to be educated about and aware of their organizations’ cybersecurity posture. Regulations hold them responsible for decision-making and governance. Meanwhile, increased ransomware attacks pose a financial risk to their shareholders. To enhance the risk analysis, questions like these can provide visibility into… Read More
Tech Center