
- Souki Chahid
Systemic cyber attacks are a real risk for US banks
CyberCube and Fitch Rating collaborated to quantify the impact of systemic cyber risks on the US banking sector
Read Article

- Emmanuel Thioux
Licensing and authorization via AWS
CyberCube's cyber risk analytics uses Neptune via AWS as their License Manager Service, helping to accomplish user authorization.
Read Article

- Pascal Millaire
Ransomware losses are not undermining the sustainability of cyber insurance
Ransomware losses are not undermining the sustainability of cyber insurance
Read Article

- Cody Stumpo
Keeping up with cyber accumulation risk: Portfolio Manager v3.0
With the release of PM v3.0, CyberCube has increased the analytical flexibility with which PM has come to be identified
Read Article

- Darren Thomson
Creating a hybrid working environment: how to be cyber secure
The accelerated shift to remote working as a result of the pandemic has changed the way we work forever.
Read Article

- Darren Thomson
The Kaseya ransomware “double-embedded” outbreak: what does it mean for (re)insurers?
Understand why the Kaseya attack represents a novel attack distribution method to spread malicious code has now proven to be a successful strategy.
Read Article

- William Altman
Should ransomware payments be illegal? - Considerations for (re)insurers
Ransomware is increasingly top of mind for (re)insurers. Understanding both sides of the ransomware payments debate has never been more important.
Read Article

- Chelsea Law
Taking the Plunge
An Ex-Underwriter’s journey to the insurtech world
Read Article

- Darren Thomson
Cyber threat trends for your insurance business
A look at the cyber threat landscape for insurance businesses. This blog outlines those trends to help insurers understand what’s to come in the future.
Read Article

- William Altman
Fastly outage underscores global Internet fragility and the potential for catastrophic cyber losses
Fastly outage underscores global Internet fragility and the potential for catastrophic cyber losses
Read Article

- Charlotte Anderson
SolarWinds and Constant Contact: “Sister” Supply Chain Attacks
SolarWinds actors’ repeat supply chain attacks show different courses to similar objectives
Read Article

- Oliver Brew
CyberCube Foresight Series - Super-spreader technologies and cyber cat modeling
Foresight is a CyberCube community event where clients, partners and other stakeholders can get together to learn and share insightful commentary on the biggest cyber risk challenges of the day.
Read Article