Skip to content

Cyber Insurance News

The Leading Source for Cybersecurity Insurance News, Insights and Data

Can “The KEV” Help Keep Me Cyber Secure?

Posted on September 19, 2023September 19, 2023 By Martin Hinton
Department of Homeland Security’s Catalog of Known Exploited Vulnerabilities (KEV) Hits 1000 Entries

In an era where cyber threats loom large, every organization grapples with a common challenge – the ever-expanding landscape of vulnerabilities in technology products. With a staggering 25,000 new vulnerabilities emerging in 2022 alone, the question arises: how can organizations effectively allocate their limited cybersecurity resources?

The Birth of The KEV Catalog

In November 2021, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) took a significant step to address this dilemma. They introduced the Known Exploited Vulnerabilities catalog, affectionately known as “The KEV.” Its purpose was clear: to serve as the go-to source for vulnerabilities that have been actively exploited “in the wild” by cyber adversaries.

A Glimpse into the KEV Universe

Fast forward to September 18, 2023, and The KEV has notched up a remarkable milestone, surpassing 1000 entries. To commemorate this achievement, CISA’s Eric Goldstein, Elizabeth Cardona, and Tod Beardsley penned a blog post that delves into the inner workings of the KEV program and the lessons learned along the way.

Prioritization and Mitigation

The blog emphasizes two crucial points: First, organizations must prioritize mitigating KEVs as part of their vulnerability management programs, considering factors such as the product’s usage and exploitability. Second, it underscores the imperative of technology providers developing products with reduced vulnerabilities from the outset, in line with the National Cybersecurity Strategy.

Cracking the Code: How it Works

Maintaining The KEV catalog is no small feat. CISA’s team follows a stringent three-step process to identify vulnerabilities for inclusion. They require each candidate vulnerability to have a CVE ID, solid evidence of active exploitation in the wild, and an available mitigation solution.

Measurable Progress

The blog post also celebrates the progress achieved since the KEV’s inception. Federal agencies have demonstrated a significant reduction in the exposure time of KEVs, ensuring swifter remediation.

Strategic Prioritization

Organizations seeking to improve cybersecurity are encouraged to use The KEV as a starting point for prioritizing vulnerability management. The importance of a vulnerability varies based on its context within an organization, and models like the Stakeholder Specific Vulnerability Categorization (SSVC) aid in tailored prioritization.

The Road Ahead

CISA’s mission with The KEV is far from over. They are dedicated to making it more accessible and informative, with plans to integrate it into existing vulnerability management tools. They also aim to provide additional context by adding fields such as notes on whether a KEV is being used by ransomware actors.

A Collective Effort

The KEV is a testament to collaboration. CISA actively seeks feedback and input from the cybersecurity community to refine and improve this invaluable resource.

In a world where cybersecurity is paramount, The KEV catalog stands as a beacon of hope, aiding organizations in their ongoing battle against cyber threats. With 1000 entries and counting, it’s a testament to the dedication and vigilance of those working tirelessly to secure the digital realm.

Source: KEV Catalog Reaches 1000, What Does That Mean and What Have We Learned 

Other News: How Much Is Cyber Insurance?(Opens in a new browser tab)

Department of Homeland Security Tags:Cybersecurity, Department of Homeland Security, The Kev

Post navigation

Previous Post: Europe’s First MGA for Cyber Insurance, Stoik, Raises €11 million ($10.7 million) from Blue-Chip Investors
Next Post: Potential Insurance Conflicts Exposed by New SEC Cybersecurity Reporting Rules

Related Posts

  • NSA to Create New Artificial Intelligence Security Center Department of Homeland Security
  • CISA Releases Draft Update to Cyber Incident Response Plan for Public Review Cybersecurity

Get the Cyber Insurance Newsletter

Receive weekly updates on the top news on cyber insurance.

Cyber Insurance News

Cyber Insurance News
In the wake of the Harrods hack and cyberattacks impacting other retailers, the alarming state of UK cybersecurity will be revealed in 2024. From cyberattacks hitting major UK retailers like Co-op and Harrods to small businesses struggling without protection, the message is clear—cybercrime is a national threat.

New research by Pen Underwriting reveals that while 90% of UK and Irish businesses feel secure, only 47% have dedicated cyber insurance. Even more shocking—only 18% of businesses earning under £1 million are covered. The cost isn’t just financial—real people suffer, like the couple who lost their wedding cake due to a ransomware attack.

Watch now to understand:

Why UK businesses are dangerously unprepared

How cyberattacks are more common than fires or theft

The key role of employee training, data backups, and multi-factor authentication (MFA)

Why cyber insurance is no longer optional

Visit www.cyberinsurancenews.org for the latest cyber insurance and cybersecurity updates.

#UKCybersecurity #CyberInsurance #SmallBusinessSecurity #CyberCrime
Harrods hack UK Cybersecurity Crisis: Shocking Stats, Real Victims & Business Risks. #cybersecurity
Cyber Insurance Compliance Is Reshaping Security in 2025!

Cyber insurance compliance is no longer optional—it's a driving force behind how companies build and execute cybersecurity strategies. In this video, we break down the latest insights from the 2025 State of Pentesting report:

✅ 59% of U.S. businesses now implement new security tools based on insurer recommendations
✅ 93% of CISOs are guided by mandates from insurance providers
✅ Pentesting isn't just for compliance—it's about proving you're covered and protected
✅ The average enterprise is spending $187,000+ annually on penetration testing

As premiums stabilize, cyber insurance compliance is pushing companies toward proactive, automated, and continuous risk assessment. Learn how to stay ahead, reduce exposure, and align with both regulators and insurers.

💡 Don’t forget to like, subscribe, and hit the bell to stay updated on the latest in cybersecurity and insurance trends!

#CyberInsuranceCompliance #CyberSecurity #PenetrationTesting #CISO #InfoSec #CyberInsurance #RiskManagement #Compliance2025 #EnterpriseSecurity #CyberDefense #TechTrends #InsuranceTech
Cyber Insurance Compliance Is Reshaping Security in 2025 #cyberinsurance
In this video, we break down the massive cyber insurance settlements following the CDK Global ransomware attack that rocked the automotive industry. 🚗💻

Auto giants like Asbury Automotive Group reported up to $10 million in cyber insurance recovery, while AutoNation only recently filed their claim — months after the breach! We explore the financial disclosures, the delayed responses, and what this means for car dealerships, investors, and cybersecurity preparedness.

Learn:
✔️ How cyber insurance is shaping post-breach recovery
✔️ Why SEC filings like 10-Q and 8-K matter
✔️ What lessons other businesses can learn from this
✔️ The real cost of a ransomware attack in automotive retail

🔔 Subscribe for more deep dives into cybersecurity, tech, and industry trends!
#cyberinsurance #CDKGlobal #RansomwareAttack #AutoIndustry #CyberSecurityNews
$10M Cyber Insurance Payout: CDK Ransomware Fallout Hits Auto Giants | #cyberinsurance
Load More... Subscribe

Categories

  • AI & Cyber Insurance
  • AI & Cybersecurity
  • Critical Infrastructure cyber insurance and security
  • Cyber Cat Bonds/Cyber Catastrophe Bonds
  • Cyber Insurance
  • Cyber Insurance APAC
  • Cyber Insurance Best Practices
  • Cyber Insurance Captive
  • Cyber Insurance Carriers & Brokers
  • Cyber Insurance Claims
  • Cyber Insurance EU
  • Cyber Insurance Financial Institutions
  • Cyber Insurance for Government
  • Cyber Insurance for Healthcare
  • Cyber Insurance for Schools
  • Cyber Insurance for SMEs/SMBs
  • Cyber Insurance For Startups
  • Cyber Insurance for Utilities
  • Cyber Insurance Geographic Markets
  • Cyber Insurance Industry Groups
  • Cyber Insurance Investments and M&A
  • Cyber Insurance Jobs
  • Cyber Insurance Laws & Regulations
  • Cyber Insurance Litigation
  • Cyber Insurance Market Size
  • Cyber Insurance MENA
  • Cyber Insurance News & Information Podcst
  • Cyber Insurance People
  • Cyber Insurance Policies & Strategies
  • Cyber Insurance Premiums
  • Cyber Insurance Reports
  • Cyber Insurance Settlements
  • Cyber Insurance Sunday – Upload
  • Cyber Insurance Systemic Risks
  • Cyber Insurance Tech
  • Cyber Insurance Threats
  • Cyber Insurance UK
  • Cyber Insurance Underwriting
  • Cyber Insurance Wholesaler
  • Cyber Regulations
  • Cyber War Exclusions
  • Cybersecurity
  • Cybersecurity and Credit Ratings
  • Cybersecurity for SMBs
  • Cybersecurity in Education
  • Cybersecurity Investment
  • cybersecurity jobs
  • cybersecurity M&A
  • Cybersecurity people
  • Cybersecurity Report
  • Cybersecurity Training
  • Department of Homeland Security
  • EU Cybersecurity
  • Insurance Linked Securities/ILS
  • Insurance Loss Warranty contract/ILW
  • Managed Service Providers
  • National Association of Insurance Commissioners' (NAIC) model cybersecurity law
  • Non-criminal Claims/Non-Malicious Claims
  • Opinion/Commentary
  • Personal Cyber Insurance
  • Personal CyberSecurity
  • Ransomware Insurance
  • Reinsurance
  • Risk Modeling
  • SEC Cyber Disclosure Rule
  • Small Business
  • Supply Chain Cybersecurity And Insurance

Send Ideas, Requests & Comments




    Tags

    AI Artificial Intelligence At-Bay Beazley CFC Chubb Cloud Security Coalition Corvus Cowbell Cowbell Cyber crowdstrike cyber attack Cybercrime cyber crime CyberCube cyber insurace cyberinsurance cyber insurance cyber insurance for small businesses Cyber Insurance Market Cyber liability Insruance cyber liability insurance cyberliabilityinsurance Cyber Resilience Cyber Risk Cyber Risk Management cyber security Cybersecurity cybersecurity insurance Cyber threats Data Breach Howden Lloyds Marsh Microsoft personal cyber insurance phishing Ransomware Ransomware Insurance reinsurance Resilience Risk Management SecurityScorecard small business
    • Cyber Insurance Books
    • Cyber Insurance Reports & Documents
    • Cyber Insurance Acronyms/Terms
    • Cyber Insurance Companies: Carriers, Brokers & Vendors
    • Industry Response: Potential Federal Insurance Response to Catastrophic Cyber Incidents
    • Ransomware Insurance
    • How Much Is Cyber Insurance?
    • Considerations for Buying Cyber Insurance
    • Cyber Liability Insurance Near Me
    • Cyber Insurance Quote
    • Newsletter
    • Legal Analysis & Full Text of 2023 SEC Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
    • Glossary
    • About Cyber Insurance News
    • Privacy Policy

    • Major Debt Issuers Relatively Indifferent to Cyber Insurance Premium Hikes: Moody’s Cyber Insurance
    • Resilience Expands Cyber Risk Underwriting Cyber Insurance Underwriting
    • Roll Out of Lloyd’s Cyber War Exclusion Dazes and Confuses Market  Cyber Insurance Best Practices
    • New Report: ICS/OT Cybersecurity Budgets Lag as Attacks Surge, Leaving Critical Infrastructure at Risk Critical Infrastructure cyber insurance and security
    • 21% CAGR for Cyber Insurance Market from 2021-2031: Report  Cyber Insurance Market Size
    • Corvus & SiriusPoint Team on Cyber Cover  Cyber Insurance Carriers & Brokers
    • 2025 Cyber Insurance Outlook: Evolving Risks and Stabilizing Market Trends Cyber Insurance Reports
    • LOKKER and Bitsight Join Forces: Privacy Risk Analysis in Cyber Insurance Cyber Insurance

    Related Cybersecurity Sites

    http://www.whatiscyberliability.com

    https://www.whatiscyberinsurance.com

    http://www.ddosattacktutorial.com

    http://www.ransomwareremovaltool.com

    Our Privacy Policy: https://cyberinsurancenews.org/privacy-policy/

    Copyright © 2024 Cyber Insurance News.

    Powered by PressBook Premium theme