Sort by:
May
Power of partnership: Moody’s RMS and Bitsight w...
![Joe Melly](/sites/default/files/content/author/field_image/2024-04/Joe%20Melly.png)
![Michael Hoffman](/sites/default/files/content/author/field_image/2024-05/Michael%20Hoffman%20-%20BitSight.webp)
With the cyber insurance market offering significant growth potential, (re)insurers are considering how to capitalize on this opportunity…
July
Quantum Computing: The Cyber Insurer’s Next Chal...
![Romeo Radanyi](/sites/default/files/content/author/field_image/2023-07/Romeo%20Radanyi.jpg)
A rapidly advancing technology, quantum computing has the potential to solve problems that traditional computers cannot. Quantum computers…
September
The Intangibles Protection Gap
![Robert Muir-Wood](/sites/default/files/content/author/field_image/2020-01/robert-moir.jpeg)
This is the third blog in a series of four blogs examining three potential “protection gaps” and the importance of “protection gap analytics…
October
Looking Beyond the Catch-all “Cyber” Category
![Robert Muir-Wood](/sites/default/files/content/author/field_image/2020-01/robert-moir.jpeg)
The mass production of the internal combustion engine facilitated many new kinds of insurable damage and loss. It also provided opportunities…
September
Equifax Data Heist: Patching Up a Familiar Problem
![Tom Harvey](/sites/default/files/content/author/field_image/2020-01/tom-harvey.jpg)
The recent Equifax incident was by all measures a significant cyberattack. As the press statement released by Equifax on September 8…
June
Crossing the Divide – How Cyberattacks Affect th...
![Gates Maus](/sites/default/files/content/author/field_image/2020-02/dummy.png)
We tend to think that critical systems responsible for managing oil rigs, power stations, steel production plants, are somewhat immune to what…
![nighttime city](/sites/default/files/content/paragraph/cta/2021-06/newsletter.jpg)
Subscribe to Our Newsletter