article thumbnail

Rethinking cyber insurance questions to find real risk

Pen Test Partners

TL;DR Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. I’ve seen a proposal form that asks if the prospective insured has anti-virus software and firewalls in […] The post Rethinking cyber insurance questions to find real risk appeared first on Pen Test Partners.

article thumbnail

Medusa ransomware hit over 300 critical infrastructure organizations until February 2025

Security Affairs

As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing.” The threat actors use PsExec to execute scripts, enable RDP access, and modify firewall rules.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: Inside the access mess no one sees — and the identity risk no one owns

The Last Watchdog

Historically, security investments prioritized the visible: firewalls, antivirus software, endpoint monitoring. With regulatory frameworks like GDPR and HIPAA intensifying scrutiny—and cyber insurers demanding tighter access controls—SPHERE’s platform-based approach is gaining traction.

article thumbnail

Cyber Essentials Plus (v3.2 – Technical Testing Prep)

Centraleyes

Organizations must prepare for the technical audit by ensuring they meet all five CE+ control areas: Firewalls Secure configuration User access control Malware protection Security update management Version 3.2 Becoming Cyber Essentials Plus certified demonstrates a robust level of cyber hygiene.

article thumbnail

The Edge Has Become the Battleground

SecureWorld News

Translation: regulators, and insurers, are shifting the burden of proof to corporate directors, not federal responders. Governance pressure joining technology risk Capitol Hill is circulating a draft "Cyber Hygiene Safe Harbor" bill: firms demonstrating secure-by-design practices would gain liability shields after nation-state incidents.

article thumbnail

Why MSSPs Must Prioritize Cyber Risk Quantification in 2025

Centraleyes

In fact, forward-looking providers and even cyber insurers are moving this direction – some cyber insurance companies are launching their own MSSP services with promises of quantified risk reduction and insurance discounts for clients. .” This is a compelling value proposition that many traditional MSSPs can’t match.

article thumbnail

LW ROUNDTABLE: Lessons learned from the headline-grabbing cybersecurity incidents of 2024

The Last Watchdog

Cunningham John Paul Cunningham , CISO, Silverfort Identity-based attacks in 2024, like those on Microsoft and Snowflake, are prompting insurers to intensify scrutiny in 2025. Questions will shift from basic MFA implementation to deeper assessments of least privilege, lateral movement prevention, and real-time identity protection.