{"id":6100,"date":"2018-07-12T13:31:42","date_gmt":"2018-07-12T13:31:42","guid":{"rendered":"http:\/\/88aa0495-1f52-4c09-81d2-c78cba5fa810"},"modified":"2018-07-12T13:31:42","modified_gmt":"2018-07-12T13:31:42","slug":"your-2018-guide-to-cyber-insurance-is-here","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/","title":{"rendered":"Your 2018 guide to cyber insurance is here"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2018\/07\/12\/91adfb81-3e60-4491-bac7-5b3d782683ed\/thumbnail\/770x578\/24d83deafc979c45ed886ffdd525b5b3\/cybersecurity1.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Today, no one is 100 percent secure &#8212; believing otherwise is hubris of Icarian proportions.<\/p>\n<p>This reality is a core reason why more organizations are turning to cyber insurance. Because without it in some form (whether it&#8217;s a purchased policy or their own allocated cash reserves), they have no safety net to stymie losses from a serious cyberattack.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/ibm-a-data-breach-will-now-cost-your-organization-3-86-million\/\" target=\"_blank\">IBM: A data breach will now cost your organization $3.86 million, if you&#8217;re lucky<\/a><\/strong><\/p>\n<p>CISOs need every risk mitigation technique they can get, and cyber insurance can an effective tool to mitigate and transfer cyber risk. But getting the right coverage, terms, and services is far easier said than done.<\/p>\n<p><strong>Learn To Navigate Today&#8217;s Cyber Insurance Market<\/strong><\/p>\n<p>Security leaders who take time to understand the ins and outs of the cyberinsurance market have a distinct advantage in everything from broker selection to policy negotiations.<\/p>\n<p>This is why we launched our cyber insurance research: to guide our business and security clients through this $1.5 to $3 billion (and growing) market and to offer insight and best practices to better mitigate cyber risk.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><strong>Key Findings<\/strong><\/p>\n<p>What we found is a cyber insurance market that looks a lot different than even 2-3 years ago and keeps evolving quickly. Likely no surprise to security pros, many insurers&#8217; cyber offerings are their fastest-growing product lines. Still, insurers and security buyers alike grapple with a list of pain points. Here are some of our key findings:<\/p>\n<ul>\n<li><strong>The cyberinsurance market is maturing, but growing pains persist.<\/strong> We see positive signs that the market is growing up: more transparent policies, fewer contentious claim holdups, and insurers with a better understanding of cyber risk. Still, it&#8217;s far from painless. Security leaders face countless hurdles, including pedantic legalese, pricing hikes, IP and reputation coverage gaps, and disconnected purchase decisions due to internal discord.<\/li>\n<li><strong>Buyers navigate a labyrinth of intertwining providers and partners.<\/strong> Our report maps out the intricate web of cyber insurance underwriters, brokers, reinsurers, consultancies, data analytics and cyber risk scoring providers, and carefully constructed carrier panels of post-breach services, such as incident response and legal counsel. And for large enterprises, there are self-insurance and captive options that may offer capitalization or tax advantages.<\/li>\n<li><strong>The devil is in the details.<\/strong> For both cyber insurance veterans and newbies, it&#8217;s easy to make mistakes. Even a slight variance in your policy&#8217;s definition of &#8220;computer fraud&#8221; can be the difference in millions of dollars of coverage. We break down cyber insurance coverage gaps and limitations into four categories: 1) Sublimits and Deductibles; 2) Explicit Exclusions; 3) Implicit Restrictions; and 4) Services Constraints. You&#8217;ll want to read up on all of these before you start redlining your policy.<\/li>\n<li><strong>Choose your cyber insurance broker wisely.<\/strong> The most important cyber insurance relationship is between the CISO and broker. Whether it&#8217;s selecting a cyber insurance carrier, updating your policy, or handling major claims, you&#8217;ll turn to your broker first. During your broker selection process, make sure that their incentives prioritize your relationship &#8212; not their relationships with partners. Review the services they offer, their cybersecurity acumen, partner ecosystem, and the experience of existing customers.<\/li>\n<\/ul>\n<p><em>&#8211;By Nick Hayes, Senior Analyst, and Heidi Shey, Senior Analyst<\/em><\/p>\n<p><em>Want to learn more about the cyberinsurance market and options for covering cyber risk? <a href=\"https:\/\/www.forrester.com\/report\/Your+Guide+To+Cyberinsurance\/-\/E-RES137808?utm_source=zdnet&amp;utm_medium=pr&amp;utm_campaign=tmbg_et&amp;utm_content=report_shey\">Download our report<\/a> here [subscription required].<\/em><\/p>\n<p><em>This post originally appeared<\/em> <a href=\"https:\/\/go.forrester.com\/blogs\/forrester-guide-cyber-insurance-2018\/\" target=\"_blank\"><em>here<\/em><\/a><em>.<\/em><\/p>\n<h3>Previous and related coverage<\/h3>\n<blockquote readability=\"18.636165577342\">\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/improve-your-cybersecurity-strategy-do-these-2-things\/\" target=\"_blank\">Improve your cybersecurity strategy: Do these two things<\/a><\/strong><\/p>\n<p>As cybersecurity gets more dangerous and more critical to organizations of all sizes, the answer is to prioritize your resources to guard the right stuff &#8212; because you can&#8217;t protect it all.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/cyber-security-report-card-why-too-many-companies-are-graded-could-do-better\/\" target=\"_blank\"><strong>Cybersecurity report card: Why too many companies are graded &#8216;could do better&#8217;<\/strong><\/a><\/p>\n<p>Lack of budget and the right skills are leaving businesses vulnerable to attack.<\/p>\n<p><strong><a href=\"https:\/\/www.techrepublic.com\/article\/how-the-cyber-insurance-industry-detects-the-next-big-attacks\/\" target=\"_blank\">How the cyber insurance industry detects the next big attacks<\/a> TechRepublic<\/strong><\/p>\n<p>Jenny Soubra, Allianz&#8217;s US head of cyber, talked with TechRepublic about counterintelligence measures on the dark web and Yelp-style sites for rating ransomware.<\/p>\n<p><strong><a href=\"https:\/\/www.techrepublic.com\/article\/cybersecurity-insurance-what-to-look-for-when-comparing-policies\/\" target=\"_blank\">Cybersecurity insurance: What to look for when comparing policies<\/a> TechRepublic<\/strong><\/p>\n<p>In a video interview with TechRepublic, Allianz&#8217;s Jenny Soubra advised companies looking for a cyberinsurance policy. She recommended buying through a broker and looking closely at policy terms.<\/p>\n<\/blockquote>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/your-2018-guide-to-cyber-insurance-is-here\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CISOs need every risk mitigation technique they can get, and cyber insurance is a great tool to mitigate and transfer cyber risk but there are some key pain points they should know about.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":6101,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-6100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your 2018 guide to cyber insurance is here 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your 2018 guide to cyber insurance is here 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-12T13:31:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/your-2018-guide-to-cyber-insurance-is-here.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Your 2018 guide to cyber insurance is here\",\"datePublished\":\"2018-07-12T13:31:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/\"},\"wordCount\":707,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/your-2018-guide-to-cyber-insurance-is-here.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/\",\"name\":\"Your 2018 guide to cyber insurance is here 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/your-2018-guide-to-cyber-insurance-is-here.jpg\",\"datePublished\":\"2018-07-12T13:31:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/your-2018-guide-to-cyber-insurance-is-here.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/your-2018-guide-to-cyber-insurance-is-here.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-2018-guide-to-cyber-insurance-is-here\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your 2018 guide to cyber insurance is here\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your 2018 guide to cyber insurance is here 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/","og_locale":"en_US","og_type":"article","og_title":"Your 2018 guide to cyber insurance is here 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-12T13:31:42+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/your-2018-guide-to-cyber-insurance-is-here.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Your 2018 guide to cyber insurance is here","datePublished":"2018-07-12T13:31:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/"},"wordCount":707,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/your-2018-guide-to-cyber-insurance-is-here.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/","url":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/","name":"Your 2018 guide to cyber insurance is here 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/your-2018-guide-to-cyber-insurance-is-here.jpg","datePublished":"2018-07-12T13:31:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/your-2018-guide-to-cyber-insurance-is-here.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/your-2018-guide-to-cyber-insurance-is-here.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/your-2018-guide-to-cyber-insurance-is-here\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Your 2018 guide to cyber insurance is here"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=6100"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6100\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/6101"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=6100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=6100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=6100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}