Open in app
Home
Notifications
Lists
Stories

Write
Michael Katz
Michael Katz

Home

Published in BitSight Security Ratings

·Apr 5

What is Cyber Insurance Underwriting?

Cyber insurance underwriting is a process that insurance companies rely on to assess client risk, evaluate exposure, and model losses, such as the cost to recover from a data breach, ransomware attack, or other malicious cyber activity. Due to a rise in claims (many of them stemming from the surge…

Cybersecurity

4 min read

What is Cyber Insurance Underwriting?
What is Cyber Insurance Underwriting?

Published in BitSight Security Ratings

·Mar 30

Gartner® Predicts Cybersecurity: 4 Insights & Recommendations for 2022 and Beyond

Security and risk leaders have already faced significant challenges in 2022. What else do they need to prioritize? The latest report from Gartner®-” Gartner Predicts 2022: Cybersecurity Leaders Are Losing Control in a Distributed Ecosystem “-outlines several key areas that leaders need to pay close attention to if they want…

Cybersecurity

3 min read

Gartner® Predicts Cybersecurity: 4 Insights & Recommendations for 2022 and Beyond
Gartner® Predicts Cybersecurity: 4 Insights & Recommendations for 2022 and Beyond

Published in BitSight Security Ratings

·Mar 30

Gartner® Predicts Cybersecurity: 4 Insights & Recommendations for 2022 and Beyond

Security and risk leaders have already faced significant challenges in 2022. What else do they need to prioritize? The latest report from Gartner®-” Gartner Predicts 2022: Cybersecurity Leaders Are Losing Control in a Distributed Ecosystem “-outlines several key areas that leaders need to pay close attention to if they want…

Cybersecurity

3 min read

Gartner® Predicts Cybersecurity: 4 Insights & Recommendations for 2022 and Beyond
Gartner® Predicts Cybersecurity: 4 Insights & Recommendations for 2022 and Beyond

Published in BitSight Security Ratings

·Mar 23

Okta Cyber Attack: Another Major Supply Chain Incident

Organizations seek answers to yet another cyber incident affecting a critical third party supplier. This piece contains a description of the recent cyber attack affecting Okta and recommended steps for all organizations as they seek to mitigate third party supply chain risk. Attack Surface Analytics Report. Request your Free Attack…

Okta

3 min read

Okta Cyber Attack: Another Major Supply Chain Incident
Okta Cyber Attack: Another Major Supply Chain Incident

Published in BitSight Security Ratings

·Feb 24

Russia-Ukraine and the Cyber Threat Landscape

Introduction The situation between Russia and Ukraine has been escalating since the start of January, when Russia stationed more than 100,000 troops along the Ukrainian Border. Although cyber security is not the primary concern in the current situation, there is a cyber security component that absolutely should not be overlooked. We…

Ukraine

4 min read

Russia-Ukraine and the Cyber Threat Landscape
Russia-Ukraine and the Cyber Threat Landscape

Published in BitSight Security Ratings

·Feb 3

Top 7 Ransomware Attack Vectors & How to Avoid Becoming a Victim

Accelerated by digital transformation and the increase in remote work, ransomware attacks are on the rise. While the Colonial Pipeline attack grabbed the headlines in 2021 due to the widespread knock-on impact of fuel shortages, notable brands, including Kia Motors, Acer, Accenture, ExaGrid, and public sector organizations like the Washington…

Cybersecurity

5 min read

Top 7 Ransomware Attack Vectors & How to Avoid Becoming a Victim
Top 7 Ransomware Attack Vectors & How to Avoid Becoming a Victim

Published in BitSight Security Ratings

·Jan 27

Mobile Application Risk Report Out Now

As security and risk professionals take steps to improve cybersecurity posture, email, network, and web security often take center stage. However, as internet use continues moving toward a mobile-centric experience, it has become essential to consider mobile applications when crafting a security strategy. BitSight’s latest research demonstrates exactly why. We…

Mobile

2 min read

Mobile Application Risk Report Out Now
Mobile Application Risk Report Out Now

Published in BitSight Security Ratings

·Jan 20

Cyber Resilience vs. Cybersecurity

As cyber events have moved from a possibility to a given, your organization must plan for cybersecurity and cyber resiliency. But how do these two practice areas differ? Let’s look at how cyber resilience compares to cybersecurity, why the two terms can’t be used interchangeably, and how you can build…

Cybersecurity

4 min read

Cyber Resilience vs. Cybersecurity
Cyber Resilience vs. Cybersecurity

Published in BitSight Security Ratings

·Jul 12, 2021

What You Need To Know About The Kaseya Ransomware Attack; And Why You Shouldn’t Be Surprised

It happened again — another disruptive ransomware attack. On July 2, 2021 Kaseya, a Florida-based software provider that provides Remote Management Monitoring, warned of its software being abused to deploy ransomware on end-customers’ systems. The attack has been attributed to the REvil ransomware group , who have claimed to have…

Kaseya

5 min read

What You Need To Know About The Kaseya Ransomware Attack; And Why You Shouldn’t Be Surprised
What You Need To Know About The Kaseya Ransomware Attack; And Why You Shouldn’t Be Surprised

Jul 2, 2021

What Is Cybersecurity Compliance? An Industry Guide

If you operate in specific sectors, cybersecurity maturity is more than a best practice, it’s a regulatory requirement. These regulations are complex and constantly changing. To help you better understand your organization’s regulatory environment and the standards and controls they stipulate, let’s break down key cyber compliance regulations by industry. …

Cybersecurity

4 min read

What Is Cybersecurity Compliance? An Industry Guide
What Is Cybersecurity Compliance? An Industry Guide
Michael Katz

Michael Katz

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable