Before last year, when envisioning a potential earthquake in Turkey, many would automatically think of so...
Cyber insurance: Overcoming the risk barriers and moving forward with growth - The Insurer
Moody's RMS' Damini Mago explores the evolution of cyber modelling. Cyber represents a sizeable insurance market, with current global cyber premiums...
Moody's RMS' Damini Mago explores the evolution of cyber modelling. Cyber represents a sizeable insurance market, with current global cyber premiums...
Article / 5 months ago
Quantum Computing: The Cyber Insurer's Next Challenge?
A rapidly advancing technology, quantum computing has the potential to solve problems that traditional computers cannot....
A rapidly advancing technology, quantum computing has the potential to solve problems that traditional computers cannot....
Article / 8 months ago
Unraveling the Complexity of Cyber Risk: Introducing Moody's RMS Cyber Solutions 7.0
The demand for cyber insurance continues to escalate as businesses grow increasingly reliant on digital infrastructure for their everyday operations, and...
The demand for cyber insurance continues to escalate as businesses grow increasingly reliant on digital infrastructure for their everyday operations, and...
Article / 8 months ago
Capital “has to be rewarded” in cyber risk: Matt Harrison - Artemis
When it comes to underwriting cyber risks, capital, whether traditional insurance and reinsurance, or alternative from the insurance-linked...
When it comes to underwriting cyber risks, capital, whether traditional insurance and reinsurance, or alternative from the insurance-linked...
Article / 11 months ago
Ransomware attacks shift beyond US borders - Cybersecurity Dive
U.S.-based organizations remain the top target for ransomware gangs, but the scale of that misfortune is waning, according to Moody’s...
U.S.-based organizations remain the top target for ransomware gangs, but the scale of that misfortune is waning, according to Moody’s...
Article / 1 year ago
What Is a Risk Data Lake?
While the “data lake” has been around for some time, the term might still be unfamiliar to many. A data lake helps simplify analytics by bringing large, distinct sources of data together under one architecture to drive the...
While the “data lake” has been around for some time, the term might still be unfamiliar to many. A data lake helps simplify analytics by bringing large, distinct sources of data together under one architecture to drive the...
Article / 1 year ago
Cyber is Uncertain, Probabilistic, and Chaotic: It’s Time Insurers Manage It like a Catastrophe Risk
Cyber risk represents one of the fastest-growing opportunities in the insurance marketplace. The cyber insurance market is set to grow at a compound annual growth rate...
Cyber risk represents one of the fastest-growing opportunities in the insurance marketplace. The cyber insurance market is set to grow at a compound annual growth rate...
Article / 2 years ago
Log4j Vulnerability and the Complexity of Modeling Cyber Risk
The cybersecurity world has turned its focus to the discovery of a vulnerability in Log4j, a Java library for logging error messages in applications. Log4j...
The cybersecurity world has turned its focus to the discovery of a vulnerability in Log4j, a Java library for logging error messages in applications. Log4j...
Article / 2 years ago
Cyber Solutions 5.2: Gain Faster Insights Today, Increase Capacity for the Future
The global cyber risk insurance market is growing and evolving fast. According to Munich Re, the market is predicted to hit...
The global cyber risk insurance market is growing and evolving fast. According to Munich Re, the market is predicted to hit...
Article / 3 years ago
Lessons from SolarWinds Breach: How IT Supply Chain Attacks Can Cause Serious Cyber Insurance Losses
Cybersecurity company FireEye was the first to reveal how a serious threat actor had hacked...
Cybersecurity company FireEye was the first to reveal how a serious threat actor had hacked...
Article / 3 years ago