Content Topics
Cyber Broking
View All![](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/WebThumbnail_Templates%20%285%29.png)
- Will Hatcher
Capitalize on the Cyber Growth Opportunity: Brokers & the Elusive SME
Cyber brokers often miss out on the growth opportunity that SMEs present. This blog details how brokers can effectively capitalize on SME placements using analytics.
Read Article
![Measuring success brokers navigating the market](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Measuring%20success%20brokers%20navigting%20cyber%20market%20blog%20image.png)
- Jenna Bhundoo
How Brokers Are Navigating the Shifting Cyber Market
A look into CyberCube's Client Product Advisor, Jenna Bhundoo, and how she sees cyber brokers navigating the current market and achieving success.
Read Article
![Key considerations for brokers in the growing cyber market](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/WT_Emma_Blog%20%281%29.png)
- Emma Drouineau
Key considerations for brokers in the growing cyber market
This blog addresses some of the key concerns brokers have in the growing cyber market, including evolving cyber threats and increased underwriting scrutiny.
Read Article
![cyber insurance readiness](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Cyber%20insurance%20readiness.png)
- Emma Drouineau
Cyber insurance readiness: Preparing your clients for the cyber underwriting process
Cyber brokers need the right data in order to help clients prepare for the underwriting process, and the right tool can help. CyberCube's Prep Module aims to help smooth the broker workflow.
Read Article
![Top 3 ways brokers can become better cyber risk advisors](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Top%203%20ways%20brokers%20can%20become%20better%20cyber%20risk%20advisors.png)
- Nate Brink
Top 3 ways brokers can become better cyber risk advisors
Cyber brokers must become better cyber risk advisors, continuously delivering value and expertise to clients during the cyber insurance buying process.
Read Article
Underwriting Cyber Risk
View All![on demand vulnerability scanning](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/WebThumbnail_Templates%20%282%29.png)
- CyberCube
On-demand vulnerability scanning: How cyber insurers can refine their risk selection
Cyber insurers must leverage relevant data when choosing which risks to underwrite and the on-demand scanning vulnerability tool used is vital to assist with this.
Read Article
![cyber data conundrum blog 4](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/WebThumbnail_Templates%20%283%29.png)
- John Anderson
The cyber data conundrum part 4: building relevant signals
This final blog in the Cyber Data Conundrum series covers the kind of data signals should be based on, the view of signals underwriters need to make risk selection decisions and choosing the right kind of data partner.
Read Article
![The cyber data conundrum part 3: fitting signals into the underwriting workflow](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/The%20cyber%20data%20conundrum%20part%203%20fitting%20signals.png)
- John Anderson
The cyber data conundrum part 3: fitting signals into the underwriting workflow
This cyber data conundrum blog series continues, this time covering how cyber underwriters can best fit signals into their underwriting workflow.
Read Article
![cyber data signals](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Portfolio%20Manager%20v4%20The%20next%20evolution%20in%20model%20sophistication%20%287%29.png)
- John Anderson
The cyber data conundrum part 2: what signals say about the state of the dam
This blog explores the difference between how cyber security data and insurance data is used and why cyber underwriters need signals to make informed decisions.
Read Article
![The cyber data conundrum: cyber risk data in insurance](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/The%20cyber%20data%20conundrum%20cyber%20risk%20data%20in%20insurance.png)
- John Anderson
The cyber data conundrum part 1: cyber risk data in insurance
With the volume of cyber risk data available to underwriters, they need to be able to cut through the noise and access the signals they need to make informed underwriting decisions. This blog will provide details on the data needed to achieve profitability in the cyber insurance market.
Read Article
Cyber Modeling
View All![what insurance execs need to know about cyber risk](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/What%20Insurance%20Executives%20Need%20to%20Know%20About%20Cyber%20Risk%20blog%20header%20image.png)
- CyberCube
What Insurance Executives Need to Know About Cyber Risk
As cyber risk evolves, (re)insurance executives must being open to continuously learning about this line. Leaders should leverage the relevant solutions to guide them to success.
Read Article
![Portfolio manager v4](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Portfolio%20Manager%20v4%20The%20next%20evolution%20in%20model%20sophistication%20%281%29.png)
- Cody Stumpo
Portfolio Manager v4: The next evolution in model sophistication
CyberCube's cyber risk modeling solution, Portfolio Manager, has released a fourth update. PMv4 better quantifies cyber catastrophe risk for (re)insurers.
Read Article
![](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/6%20ways%20to%20better%20understand%20your%20tail%20risk%20%281%29.png)
- Anjali Nagrani
6 ways to better understand your tail risk
Six tips to consider when evaluating cyber portfolio modeling solutions to help you make better, more profitable decisions
Read Article
![developing cyber cat scenario](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Catastrophe%20scenarios%203.png)
- Charlotte Anderson
Defining the Possible Part 3 of 3: 6 components to developing a cyber catastrophe scenario
Building a cyber catastrophe scenario involves six key components: attackers, targets, objectives, vulnerabilities, impact and consequences.
Read Article
![](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Untitled%20design%20%282%29.png)
- Laurel Di Silvestro
Defining the Possible Part 2 of 3: Criteria for incorporating cyber attack scenarios in insured loss models
By definition, cyber attack scenarios are developed based on their potential to depict systemic financial aggregation events impacting multiple insureds.
Read Article
Cyber Threat Intelligence
View All![change healthcare attack](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/WT-ChangeHealthcare-PR%20%281%29.png)
- William Altman
The Change Healthcare Attack: Quantifying Footprint for Cyber (Re)insurers
The Change Healthcare attacked affected many entities in the US. CyberCube used data to provide an exposure footprint estimate of companies affected.
Read Article
![cyber insurance predictions 2024](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/WT-CyberPredictions2024%20%281%29.png)
- Yvette Essen
Cyber Insurance Predictions 2024
The cyber insurance market is maturing, so (re)insurers need to be prepared for what's to come in 2024. This blog summarises some of the predictions from our cyber experts.
Read Article
![meta pixel](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Meta_Pixel_1.png)
- William Altman
Meta Pixel: What Cyber (Re)insurers Should Know
Organizations using Meta Pixel have the potential to violate data privacy regulations. CyberCube can help customers identify companies that are using Meta Pixel.
Read Article
![Five years of wannacry](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/Portfolio%20Manager%20v4%20The%20next%20evolution%20in%20model%20sophistication%20%289%29.png)
- Michael Sokolov
Five years of WannaCry: what has changed in ransomware since 2017?
Ransomware has evolved since the WannaCry ransomware attack in 2017, from changes in how complex ransomware is, to how attacks have become more targeted.
Read Article
![What (re)insurers need to know about destructive wiperware](https://www.cybcube.com/hubfs/BLOG/Blog%20Images/What%20%28re%29insurers%20need%20to%20know%20about%20destructive%20wiperware.jpg)
- Michael Sokolov
What (re)insurers need to know about destructive wiperware
Wiper malware is on the rise. (Re)insurers must pay attention to this malicious software, as the destructive attacks have created chaos in the past.
Read Article