.png)
- Emmanuel Thioux
Technology series: Using AWS SAM for end to end local developing and testing
Instead of uploading Lambdas and Layers to AWS and UI to CloudFront, you just need to run SAM for your back-end and NPM for hosting your front-end.
Read Article

- Yvette Essen
Dashing straight for “shiny new” security tools compounds cyber breach challenges
A rush to take on a variety of new security products can act as a distraction from preparing for a cyber breach.
Read Article

- John Anderson
Cyber study for TRIA anniversary
TRIA plays a key role for insurance firms as a US federal backstop that affords a cap on loss for qualifying lines of business impacted by acts of terrorism.
Read Article

- Oliver Brew
A great day out in the Isle of Dogs countryside...
The 1st UK CyberCube volunteer day took place outdoors at the Mudchute Farm & Park in the Isle of Dogs.
Read Article

- Brittany Baker
Giving voice to "silent" cyber
There is still a long way to go before the industry reaches a consensus on how to holistically handle this silent cyber risk.
Read Article
.png)
- Charlotte Anderson
Avast breach highlights supply chain attack threat
Several news outlets reported that Avast, a firm owning 10% of global market share for anti-virus solutions, was breached through an insecure VPN account.
Read Article

- Yvette Essen
Data privacy regulation a cost burden but nonetheless important
The cyber market is facing a shifting regulatory environment leading to a higher cost base, but such legislation is important and lessons can be learnt.
Read Article

- John Anderson
Deciphering an eight-hour business interruption outage
Amazon Web Services (AWS) recently reported that it suffered an eight-hour outage from a distributed denial of service (DDoS) attack.
Read Article

- Yvette Essen
Why model divergence among software providers is actually a positive thing
Model divergence is a good thing and is more valuable than all software providers producing the same numbers.
Read Article
.png)
- Laurel Di Silvestro
The changing cyber underwriting landscape for small risks – Where do cyber risk models, and data delivery technology solutions fit?
The insurance industry faces disruptions to figure out how to underwrite these risks while accessing info on vulnerability data & risk mitigation processes
Read Article
.png)
- Oren Schetrit
Brokers: How to make cyber risk advisory part of the routine
What can brokers do to help their clients manage each of these 3 factors and reduce their loss cost?
Read Article

- John Anderson
The Challenges of Underwriting Large Risk
Challenges of underwriting large risk
Read Article