Beyond the Policy: How Companies Can Survive Cyber Events Traditional Insurers Won’t Cover

By Dustin Carlson, President of SRA 831(b) Admin Cyber insurance is essential for businesses that rely on any form of digital infrastructure, but many of them think they are covered in the event of a claim, when in fact the odds are against them. Policy exclusions and sublimits leave critical gaps, especially as cyber threats … Read more

AI cyber threat surge leaves most firms underprepared, BCG survey warns

A new Boston Consulting Group report shows a growing gap between Artifical Inteligence powered attacks and how companies defend against them. The report points to rising losses, more executive worry, and slow investment, even as threats increase. BCG surveyed 500 senior leaders worldwide across different industries and regions to highlight the seriousness of the problem. … Read more

Cyber Risk Management Surge: New Report Shows Rising Threats and Bigger 2026 Security Budgets

Organizations are dealing with higher costs from third-party risks, ongoing ransomware attacks, and more frequent technology failures. A new Marsh report warns that 2026 could be especially challenging as attackers become more aggressive and supply-chain issues worsen. The Cyber Catalyst Report, which surveyed over 2,200 cyber risk leaders in 20 countries, highlights these growing threats … Read more

Cyber Insurance “Policy Buyback” Approved for Victims of 23andMe Hack

A U.S. bankruptcy judge has approved a cyber liability insurance policy buyback that will allow the company once called 23andMe (now Chrome Holding Co.) to transfer $16.5 million in cash from its cyber insurers to those impacted by its hack (see the key legal document below). The legal decision this week is a step toward … Read more

The Hidden Costs of Cyberattacks on Small Businesses

News of data breaches and cyberattacks against large corporations seems to make headlines every week. It’s easy for small business owners to think those stories don’t apply to them, but that assumption can leave them vulnerable. Attackers today use automated tools that scan the internet for potential weak spots. Any business that relies on technology, … Read more

×