Blog Archive

Beyond Risk Scores: How Insurers Can Use Cyber Data for Smarter Underwriting

Risk scores have become a staple of cyber insurance underwriting — but in 2026, forward-looking insurers are going a step [...]

From Fragmented to Federated: Rethinking Cyber Governance in Complex Organisations

Modern organisations don’t always fit neatly into a single box. From multi-academy trusts and national research partnerships to international NGOs [...]

Operational Cybersecurity for Multi-Academy Trusts: 5 Steps to Build Resilience

Running a single school is complex. Running a Multi-Academy Trust (MAT) magnifies that complexity — especially when it comes to [...]

The Economics of Cyber Insurance: Balancing Cost, Coverage and Controls

As cyber threats grow in complexity, cyber insurance is no longer a luxury — it's a necessity. But for many [...]

Cross-Boundary Collaboration: Securing Shared Services in the Public Sector

From joint council initiatives to shared NHS delivery units and cross-force police services, public sector organisations are increasingly collaborating to [...]

Cyber Insurance in 2025: How Risk Ratings Are Changing Underwriting

Cyber insurance used to be based on sector, turnover, and a brief questionnaire. In 2025, that's changed. With the rise [...]

Preparing for Cyber Litigation: Risk Frameworks & Legal Readiness

Cybersecurity is no longer just an IT or compliance issue — it’s now a serious legal exposure. In 2025, companies [...]

Redefining Cyber Risk Quantification: How Cyber Tzar’s Virtuous Triangle Solves the Challenges of Modern Cyber Threats

Executive Summary Cyber risk quantification has often been viewed with scepticism, dismissed as simplistic, static, or out of step with [...]

The Virtuous Triangle: Scaling Cyber Risk Assessments with Purpose and Precision

Risk isn’t static. It changes with every new CVE, every new phishing campaign, and every new misconfigured server. In a [...]

The New Age of Supply Chain Attacks: How to Build Resilience in 2025

The cyber kill chain has shifted. In 2025, attackers aren’t just going after large enterprises — they’re targeting the suppliers, [...]

Go to Top