All our risk-management news
Cloud Outage Loss Scenario: When Your Infrastructure Provider Goes Dark
A realistic loss scenario analyzing what happens when a major cloud provider outage strikes — business interruption cascades, insurance triggers, and the coverage gaps that leave policyholders exposed.
Michael Guiao
7 min read
Insider Threat Loss Scenario: The Privileged Employee Who Walked Away With Everything
A detailed loss scenario analyzing an insider threat data exfiltration event — from detection through forensic investigation, regulatory reporting, and insurance recovery. Underwriters need to understand how insider claims differ from external attacks.
NIS2 Article 21 Technical Measures: The Complete Security Requirements Breakdown for 2026
NIS2 Article 21 defines 10 mandatory security measures every essential and important entity must implement. Complete breakdown of each requirement with implementation guidance, audit evidence expectations, and compliance timeline.
Residual Risk Is Why Insurance Exists
Security reduces risk. It never eliminates it. The gap between what controls can achieve and what remains is residual risk — the entire reason cyber insurance exists. And it is the most under-discussed concept in the industry.
Supply Chain Attack Loss Scenario: What Happens When Your Vendor Gets Compromised
A detailed walkthrough of a realistic supply chain cyber attack loss scenario — from initial compromise through business interruption, third-party claims, and insurance recovery. Essential reading for underwriters pricing vendor-dependent risks.
blog.featured
An AI Agent Deleted a Startup's Production Database — Can You Insure Against That?
7 min read
Why Your Cyber Risk Register Is Lying to You — And What to Do About It
9 min read
Zurich's £8.1B Beazley Acquisition: What It Means for Cyber Insurance's Future
6 min read
NIS2 Penalties Explained: Essential vs Important Entities and What They Mean for Coverage
9 min read
Premium Report
2026 Cyber Risk Landscape Report
24 pages of threat analysis, claims data, and underwriting implications for European cyber insurance.
View Reports →