For a more general overview of cloud computing, please see our first blog post: Cloud Computing 101. What are some benefits of cloud computing for SMEs? Security and safer storage: One of the major...
cyber resources
Acceptable Use in a Remote World
The workplace dynamic has changed drastically with many employees not going to the office every day. In many jobs (not all), employees have the ability to work from almost anywhere (at home, in a...
Cloud Computing 101 (1/2)
Cloud computing is the delivery of different computing services through the Internet. These resources include applications and tools like data storage, servers, databases, networking, software,...
Cowbell Adds Security Insights from Google Cloud to its Risk Rating Model for Cyber Insurance
We are pleased to announce that Cowbell has added real-time risk insights from Google’s security platform, Security Command Center, to its cyber insurance risk assessment model. Cowbell...
Cowbell Guidelines for Document Collection and Storage
Sensitive data loss or theft almost always harms a company's reputation and results in penalties under regulations for non-compliance. It is common knowledge that during a data breach, bad actors...
Story Behind the Name: What are the Cowbell Factors?
Ever wondered why this podcast is named “The Cowbell Factors”? In this episode, you’ll find out from our SVP of Marketing and Tech Partners, Isabelle Dumont. Here are some key takeaways: The Cowbell...
“The Importance of Being Proactive: Crowdstrike, A Cowbell Partner” with Adam Cottini
It’s the one-year anniversary of The Cowbell Factors Podcast! This week, we welcomed Adam Cottini, Director of Business Development - Insurance and Legal Verticals at CrowdStrike to the show. Here...
The Risks of the Advertising Arms Race
As more and more people use the Internet, online advertisers have followed people developing tools to gather information on individuals' interests and which targeted ads will be most effective. One...
IoT 101
Nowadays, most people own some type of “smart” device - from smart watches to smart cars to smartphones. These revolutionary technologies encompass the next wave of “Internet of Things,” and signal...
Detecting Insider Threats for User Behavior (4/4)
This is the fourth and last part of a multi-part series. We encourage you to also read the blogs: Zero Trust 101 for SMEs, What is Zero Trust and Why is Zero Trust Important. A key component of the...
Cowbell Blog
Grow your cyber IQ with our insights into cyber insurance, cyber risk, and cyber security.