Blog Archive

Cyber Insurance Ratings vs. Reality: Are Risk Scores Helping or Hindering Underwriting?

Cyber insurance risk ratings — from platforms like Kynd, SecurityScorecard, and Cyber Tzar — have become integral to the underwriting [...]

Beyond Scores: Turning Third-Party Risk into a Measurable, Managed Asset

Third-party risk management (TPRM) has come a long way — but far too many organisations are still relying on static [...]

Beyond Risk Scores: How Insurers Can Use Cyber Data for Smarter Underwriting

Risk scores have become a staple of cyber insurance underwriting — but in 2026, forward-looking insurers are going a step [...]

From Fragmented to Federated: Rethinking Cyber Governance in Complex Organisations

Modern organisations don’t always fit neatly into a single box. From multi-academy trusts and national research partnerships to international NGOs [...]

Operational Cybersecurity for Multi-Academy Trusts: 5 Steps to Build Resilience

Running a single school is complex. Running a Multi-Academy Trust (MAT) magnifies that complexity — especially when it comes to [...]

The Economics of Cyber Insurance: Balancing Cost, Coverage and Controls

As cyber threats grow in complexity, cyber insurance is no longer a luxury — it's a necessity. But for many [...]

Cross-Boundary Collaboration: Securing Shared Services in the Public Sector

From joint council initiatives to shared NHS delivery units and cross-force police services, public sector organisations are increasingly collaborating to [...]

Cyber Insurance in 2025: How Risk Ratings Are Changing Underwriting

Cyber insurance used to be based on sector, turnover, and a brief questionnaire. In 2025, that's changed. With the rise [...]

Preparing for Cyber Litigation: Risk Frameworks & Legal Readiness

Cybersecurity is no longer just an IT or compliance issue — it’s now a serious legal exposure. In 2025, companies [...]

Redefining Cyber Risk Quantification: How Cyber Tzar’s Virtuous Triangle Solves the Challenges of Modern Cyber Threats

Executive Summary Cyber risk quantification has often been viewed with scepticism, dismissed as simplistic, static, or out of step with [...]

The Virtuous Triangle: Scaling Cyber Risk Assessments with Purpose and Precision

Risk isn’t static. It changes with every new CVE, every new phishing campaign, and every new misconfigured server. In a [...]

Go to Top