The Best Cyber Insurance is Not What You Think

The Best Cyber Insurance is Not What You Think

Cyber insurance is now a big business (and growing more over time). Cyber insurance statistics show that claims grew by 100% in the past three years while claims closed with payments grew by 200% with around 8100 claims paid in 2021. Of course, certain industries are...
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design

Earthquakes, Cyber Breaches, and Mitigating Disasters through Design

By Archie Agarwal In an era where cyber threats are constantly evolving, relying solely on reactive security measures is inadequate. The imperative for proactive risk assessment and mitigation has never been greater. Much like CAD drawings provide a blueprint for...
A Case for Automated Threat Modeling

A Case for Automated Threat Modeling

Nobody thinks modeling threats is a bad idea. And yet threat modeling isn’t broadly adopted in the development community yet. Why is that? According to Izar Tarandach and Matthew J. Coles in their book Threat Modeling, it’s because “convincing stakeholders that threat...
How to Maximize Your Cybersecurity Budget With Threat Modeling

How to Maximize Your Cybersecurity Budget With Threat Modeling

Everyone who is familiar with threat modeling knows that threat modeling is used to model threats in software applications. And if that’s all threat modeling did, it would still be really useful. But threat modeling can do something just as important. It can tell you...
Increased Cyber Threats to Medical Devices Cause Healthcare Industry Self-Evaluation

Increased Cyber Threats to Medical Devices Cause Healthcare Industry Self-Evaluation

When you think of cyber threats, you probably think about phishing attacks targeted at corporate employees or ransomware aimed at financial institutions. You probably don’t think about a hacker attacking a digital thermometer, but you should.  The next great wave of...
What is SOAR and How Does It Help Secure Enterprises?

What is SOAR and How Does It Help Secure Enterprises?

This is an excerpt from a panel we participated in at the NY Cyber Security Summit. You can check out the entire panel below: Security Orchestration Automation Response (SOAR) refers to security information and event management (SIEM) technology that enables DevOps...