Summary Cowbell customers take an alarming average of 36 days to detect compromised identities. Meanwhile, 40% of breaches involve lateral movement, and 32% of all incidents lead to fraudulent wire...
Cyber Risk Posts
Cowbell Resiliency Services (CRS): Empowering Policyholders with Proactive Cyber Defense
As cyber threats become more advanced—driven by AI innovations and intensified by geopolitical tensions—organizations of all sizes must rethink how they protect themselves. At Cowbell, we’ve long...
Executive Protection: A Critical Component of Safeguarding Your People and Organization
Although executive protection is not a new concept, it is increasingly becoming one of the responsibilities associated with CISOs and their teams, who are expected to protect key employees from...
The Enemy Within – Insider Threat Awareness
National Insider Threat Awareness Month (NITAM) is observed every September and is a collaboration between U.S. federal agencies and industry organizations to educate and emphasize the importance of...
Social Engineering Attacks: What Are They and How to Prevent Them
Did you know small businesses with less than 100 employees receive 350% more social engineering attacks than larger enterprises? But, it’s not just small businesses that are at risk: given how...
Cowbell Goes to Congress
The last week in June, Jack Kudale, Co-Founder and CEO of Cowbell and Matthieu Chan Tsin, Vice President of Cybersecurity Services spent two days in Washington DC with members of Congress to discuss...
Aggregated Intelligence and Data Imputation Models in Risk Assessment
Introduction Data is the lifeblood of risk assessment and analytics. Every data scientist dreams of having access to clean, reliable, unbiased, and labeled data in large volumes. Data is ubiquitous,...
Backup Strategies: To 3-2-1 and Beyond
Today, backup strategies are more important than ever. With ransomware and other cyberattacks increasing it is imperative to have a robust strategy in place. One of the most foundational ones has...
The Importance of Notifying Your Cyber Insurer First
Cyber threats evolve at an unprecedented pace, with bad actors employing more sophisticated methods to exploit, and monetize, the vulnerabilities of victim organizations. From ransomware attacks to...
Our Latest Patents: Cyber Risk Assessment and Cybersecurity Insurance Platform
Imagining the range and severity of the various kinds of cybersecurity risks and vulnerabilities today, many professionals feel overwhelmed. And understandably so: the risk landscape is dynamic,...
Cowbell Blog
Deepen your understanding of cyber risk with insights that make cyber insurance and cybersecurity clearer, smarter, and easier to navigate.
Subscribe
Stay up-to-date with Cowbell









