As more and more people use the Internet, online advertisers have followed people developing tools to gather information on individuals' interests and which targeted ads will be most effective. One...
Resources
Cowbell Blog
Grow your cyber IQ with our insights into cyber insurance, cyber risk, and cybersecurity.



Working with Cowbell: A Broker Perspective with Manny Cho of RPS
It’s the one-year anniversary of The Cowbell Factors Podcast! You may have heard the kick-off episode of Season 5 featuring Cowbell’s Head of Underwriting, Caroline Thompson. She concluded the...
How continuous underwriting and adaptive cyber insurance are changing the market
No other line of insurance has seen an evolution quite like cyber. Starting as a simple add-on or endorsement to a BOP policy, insurance experts quickly realized that there was a need to roll out...
Secure your cookie jar from this MFA loophole
Over the years, threats to password security have increased, which is why so many organizations have adopted the use of Multi-Factor Authentication (MFA) as a way to improve account security. MFA is...
Under the Hood of Underwriting
It’s the one-year anniversary season of The Cowbell Factors! Season 5 has kicked off with our first episode featuring Cowbell’s Head of Underwriting, Caroline Thompson. Here are our top takeaways...
In Case You Missed It: Recap of Cowbell’s Inaugural Cyber Insurance Day in DC
In the wake of Cybersecurity Awareness Month, Cowbell hosted its inaugural Cyber Insurance Day in Washington D.C., with speakers from federal agencies, non-profit organizations, and the private...
IoT 101
Nowadays, most people own some type of “smart” device - from smart watches to smart cars to smartphones. These revolutionary technologies encompass the next wave of “Internet of Things,” and signal...
Detecting Insider Threats for User Behavior (4/4)
This is the fourth and last part of a multi-part series. We encourage you to also read the blogs: Zero Trust 101 for SMEs, What is Zero Trust and Why is Zero Trust Important. A key component of the...
Why is Zero Trust Important? (3/4)
This is the second part of a multi-part series. We encourage you to also read the blog: Zero Trust 101 for SMEs and What is Zero Trust. It is critical to develop a Zero Trust policy or strategy that...
What is Zero Trust (2/4)
This is the second part of a multi-part series. We encourage you to also read the blog: Zero Trust 101 for SMEs For today's modern digital transformation, Zero Trust is a framework for safeguarding...