Impossible is temporary. Impossible is nothing. This week marks a significant innovation milestone for Cowbell. With the launch of Cowbell Specialty Insurance Company (Cowbell Speciality, our...
featured
Q3 Cyber Round-Up Report
This week’s special edition episode of The Cowbell Factors Podcast featured Marion Krueger, Content Marketing Lead at Cowbell, discussing the recently released Q3 Cyber Round-Up report. To her role...
Strength in Numbers: Partnering Against Cyber Threats
This week’s episode of The Cowbell Factors featured Michael Daniel, President and CEO of the Cyber Threat Alliance (CTA). Michael brings a wealth of knowledge and experience to his current role,...
Let’s Get Digital with Erin Dyer Blain
On this week’s episode of The Cowbell Factors, we had the chance to talk with Cowbell’s very own Director of Digital Distribution, Erin Dyer Blain. Her background and career path have led her to be...
The Cyber Landscape: TN and Beyond with FBI Memphis
This week on The Cowbell Factors, we welcomed two guests from the FBI Memphis Field Office: Special Agent in Charge Doug Korneski and Special Agent Andre Edwards. SAC Korneski and SA Edwards come...
“The Claims Experience” with Head of Claims & Risk Engineering Theresa Le
To kick off Season 4 of The Cowbell Factors Podcast, we welcomed our very own Theresa Le, Head of Claims and Risk Engineering at Cowbell. Though she has only been with the company for about six...
Operational Technology – everything you need to know
The core role of operational technology is the use of hardware and software to monitor, control and manage industrial operations, including the equipment and the processes they use. The term...
Takeaways from “The State of Ransomware 2022” Report
Sophos recently published its report, “The State of Ransomware 2022”. Of the 5,600 respondents surveyed, about two-thirds experienced ransomware attacks last year, which is a 78% increase in volume...
Best practices for securing used and unused ports (II/II)
In this second blog post on port security, we’ll jump directly into best practices. If you need to go back to the basics, please read: Port Security and Why It Is Important (I/II). A network...
Port Security and Why It Is Important (I/II)
In this first blog about port security, we will go over the basics of what are ports and why it’s important to secure them. If you’re already well-versed in the concept of port, jump to our second...
Cowbell Blog
Grow your cyber IQ with our insights into cyber insurance, cyber risk, and cyber security.