0,00 € 0 Cart

Cyber Research

Guest Blog: Cyber risk and cybersecurity: A systematic…

Cyber ResearchMay 12, 2022

The following article is a guest blog by Frank Cremer, currently a PHD candidate at the technical University of Cologne about his and his co-authors newest paper, systemtically tabulating and reviewing existing cyber risk and…

Cyentia “Ripples” Report: Massive Increase in Supply Chain…

Cyber ResearchMarch 3, 2022

In the report Ripples Across The Risk Surface ([zotpressInText item="{2414728: ZJ5XSWDM}" etal="yes" format="%a% (%d%)"]), the Cyentia Institute investigates supply chain cyber attack. Cyentia defines Ripples as supply chain cyber attacks that have cascading effects, causing…

H1/2021 Suggested Reading: Cyber Insurance Market undergoing massive…

Cyber Insurance MarketAugust 3, 2021

After the surge of cyber crime during the COVID 19 pandemic, spearheaded by a surge in ransomware attacks, the renewals on January 1st 2021 were the by far most anticipated in the history of cyber…

Cyber Insurance Incident Response: Market tends towards commoditization…

Cyber ResearchJuly 26, 2021

In the context of economic welfare, the key fact of cyber insurance that sets it apart from likely any other insurance type is the possibility through efficient and economic incident response to limit and reduce…

New RUSI report showcases the gap between theory…

Cyber ResearchJune 28, 2021

A new report released by the Royal United Services Institute (RUSI), authored by Jamie McColl, Jason Nurse, and James Sullivan, analyzes the role of the cyber insurance industry as an enabler and facilitator for public…

New Section on Cyber Bachelor & Master Thesis…

Cyber ResearchApril 3, 2021

We have created a new section in our Knowledge Base on possible bachelor and master thesis topics in the cyber risk area. Currently, the list consists of 13 topics. The list is growing, so if…

Latest Posts

  • Thoughtleadership Piece #01: Bias in reporting on cyber insurance disputes August 29, 2023
  • 5th ASTIN Cyber Workshop (ACW) Meeting: An Overview of Current Topics in the Cyber Insurance Market November 16, 2022
  • Guest Blog by Dr. Daniel Woods: “Cyber Insurance Should Cover Psychological Support” November 7, 2022
  • Guest Blog: Cyber risk and cybersecurity: A systematic review of data availability May 12, 2022
  • Cyentia “Ripples” Report: Massive Increase in Supply Chain Frequency and Sophistication March 3, 2022
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

cyber-economics.com provides you with the newest developments and news about cyber risk from academia and the business sector.

Linkedin

Legal

  • Impressum
  • Privacy Policy
  • Cookie Policy