Cyber Insurance Partnership: Resecurity & Braly Group Unite to Boost Risk Innovation

Cyber Insurance Strategy Enhanced by Tech-Insurance Synergy – Resecurity and Braly Insurance Group have joined forces to revolutionize how businesses tackle cyber insurance. The offer? Merging cutting-edge threat intelligence with expert cyber risk management strategies. A Unified Approach to Cyber Risk Management The partnership introduces a coordinated framework that blends real-time threat data with personalized … Read more

2% of Large Firms Face High Risk from Scattered Spider

When 2% is a lot – Two percent might not sound like much. That’s until you realize it’s 287 global companies. It’s not a rounding error. That’s a buffet for Scattered Spider, which has reemerged as a significant cyber threat in 2025. The group now poses a serious challenge for cyber (re)insurance portfolios. This analysis, … Read more

Leaked Credentials Drive Smart Cyber Insurance Coverage Decisions, Gallagher Re TIDE Analysis Shows

Understanding Cyber Insurance Coverage in the Age of Leaked Data The landscape of cyber insurance coverage is evolving rapidly. A new analysis from Gallagher Re reveals how leaked credentials, often found on the surface, deep, and dark web—serve as powerful predictors of cyber claim frequency. This finding provides insurers with sharper tools to assess cyber … Read more

CyberCube and Aviva Partner: AI Boosts Cyber Threat Intelligence and Risk Management

AI integration enhances Aviva’s cyber exposure management CyberCube and Aviva have partnered to apply AI technology to cyber threat intelligence and risk management. The collaboration uses CyberCube’s Portfolio Threat Actor Intelligence tool to identify threat actor behavior and their preferred targets. Aviva becomes the first insurer to apply this tool regularly in its exposure management … Read more

Alarming Shift: 2025 Sophos Report Reveals Cyberattackers Are Adapting Faster

“No plan survives first contact with the enemy.” That old military adage applies as much to cybersecurity as it does to battlefields. If you are attacking, you need adaptation built into the attack plan. Cybercriminals are heeding this old wisdom in the digital world. The 2025 Sophos Active Adversary Report cyber attackers are quickly pivoting … Read more

×