This is the second part of a multi-part series. We encourage you to also read the blog: Zero Trust 101 for SMEs For today's modern digital transformation, Zero Trust is a framework for safeguarding...
risk engineering
Zero Trust 101 for SMEs (1/4)
This is the second part of a multi-part series. We encourage you to also read the blog: What is Zero Trust and Why is Zero Trust Important. Earlier this month, Cowbell CPO and Co-Founder Rajeev...
What is Vendor Risk Management and Why Do You Need to Manage Your Vendor
With the increase in outsourcing among businesses, third-party risk management becomes an integral part of an organization’s risk management framework. Nowadays, third parties and business partners...
Top Five Tips to Build a Culture of Cybersecurity
According to the World Economic Forum’s 2022 Global Risks Report, 95% of cybersecurity issues can be linked to human error. Google says that 9 out of 10 cyber incidents begin with a phishing...
Operational Technology – everything you need to know
The core role of operational technology is the use of hardware and software to monitor, control and manage industrial operations, including the equipment and the processes they use. The term...
Takeaways from “The State of Ransomware 2022” Report
Sophos recently published its report, “The State of Ransomware 2022”. Of the 5,600 respondents surveyed, about two-thirds experienced ransomware attacks last year, which is a 78% increase in volume...
Best practices for securing used and unused ports (II/II)
In this second blog post on port security, we’ll jump directly into best practices. If you need to go back to the basics, please read: Port Security and Why It Is Important (I/II). A network...
Port Security and Why It Is Important (I/II)
In this first blog about port security, we will go over the basics of what are ports and why it’s important to secure them. If you’re already well-versed in the concept of port, jump to our second...
Your information is on the dark web, now what?
The dark web has become known as a place where cybercriminals resell stolen sensitive information, including emails, usernames, passwords, financial information, etc. If you find your information on...
Cowbell’s first company-wide event: Longhorn 2022
After many months of preparation and several reschedulings due to the pandemic, it finally happened: Cowbell held its first company-wide event for all employees to get together and meet in person....
Cowbell Blog
Grow your cyber IQ with our insights into cyber insurance, cyber risk, and cyber security.