Your one-stop-shop for the latest news and analysis of all things cyber risk quantification and management. Including emerging threats, developments in global cyber risk regulation, cyber insurance, supply chain security risk, plus much more. Hear from global thought leaders and industry veterans such as John Chambers, Michael Johnson, and Douglas Hubbard on how to improve your cyber risk management.
How FAIR-MAM Helps to Assess Quantitative and Qualitative Materiality
Explore how FAIR-MAM enables you to accurately measure probable loss, respond to data breaches, track top cyber risks, & determine material impact for SEC.
Safe Security at the FAIR Conference 2023
Safe Security to share expertise with CISOs on automating cyber risk quantification, risk analysis with AI, cybersecurity controls analytics, and more
Top 5 Reasons to Attend the 2023 FAIR Conference
Explore how FAIR is evolving to meet industry requirements and the role of AI-driven Cyber Risk Management in meeting regulatory requirements
Safe Launches Industry’s First Implementation of FAIR-MAM™
Safe Security Launches Industry’s First Implementation of the FAIR Materiality Assessment Model (FAIR-MAM™) for Assessing Material Cyber Risk
Getting a Handle on Cyber Risk for Boards with Cyber Risk Quantification
Your Board is under pressure from regulatory authorities. Explore how the FAIR framework and AI-driven Cyber Risk Quantification can empower your Board.
Meeting the SEC Cyber Rule Compliance Deadline
Explore the core requirements for SEC Cyber Risk Compliance and how to measure materiality using predictive, analytics-driven Cyber Risk Quantification.
The Safe x RiskLens Acquisition Will Transform Cyber Risk Management
The SAFE Platform will embed the FAIR Model to equip businesses with the industry's first automated and AI-driven Cybersecurity Risk Management solution.
Safe Security Joins Forces with MITRE Engenuity’s Center for Threat-Informed Defense to Help Organizations Take a Predictive Security Posture
Safe's research sponsorship with MITRE's CTID will drive collaborative research and innovation and encourage the global adoption of Cyber Risk Quantification.
Top Takeaways from Gartner® Security and Risk Management Summit 2023
Discover how people are thinking about the SEC cyber risk proposals, and how SafeGPT featured in 'The Future of Security' by Gartner VP Analyst, Patrick Hevisi.
Safe Announced as Launch Partner for Wiz Integrations (WIN) Platform
This integration allows businesses to view their overall cybersecurity risk, including top issues detected by Wiz, on SAFE's Cyber Risk Management Platform.
3 Cyber Insurance Questions for Brokers
A standalone cyber policy is now a must-have for more and more small businesses, and even large enterprises.
Healthcare Providers and Hospitals Under Ransomware's Siege
According to the FBI and Internet Crime Complaint Center, 25% of ransomware complaints involve healthcare providers.
A Year in Review: 8 Reasons Why the Time is Now for Cyber Risk Quantification and Management
Eight events that propelled Cyber Risk Quantification and Management into the spotlight during 2022, proving that it is no longer an option, but the solution.
Cyber Risk Quantification and Improving Business Communication
Expert Insights interviews Saket Modi, CEO and Co-Founder of Safe Security, to discuss the importance of cyber risk quantification.
2023 is the Year of Cyber Risk Quantification
John Chambers, Founder and CEO of JC2 Ventures, writes about why businesses need to invest in Cyber Risk Quantification and Management in 2023.
TechCrunch: 2023 will be the Year of Cyber Risk Quantification
CRQ is the hottest thing in cybersecurity right now. This article by John Chambers first appeared in TechCrunch on November 7, 2022.
Reporting Cyber Risk: The Top 5 Dashboards for CISO Success
The five real-time dashboards CISOs need to visualize, prioritize, and manage cyber risk and engage in dollar-driven conversations with the board.
Services You Should Expect From your Cyber Insurance Provider
The cyber insurance market is still trying to work out what it is actually offering. Not so long ago, it was a simple product, available at a reasonable price under simple, easily comprehensible conditions.
How Easy is it to Deploy SAFE?
Discover easy it is to deploy SAFE and start your Cyber Risk Quantification and Management journey (CRQM) in under 4 weeks.
Safe Security ROSI Calculator Empowers CISOs and CFOs to Quantify the Reduction in Cyber Risk
Safe Security announced the Return on Security Investment (ROSI) Calculator, a new module of the SAFE platform.
How to Manage Risk From Attack Surface Expansion
The attack surface of every organization across the world is growing in complexity. Explore what this means for managing your cybersecurity risk.
Interactive Cost Model: New Backtesting Shows High Accuracy in Financial Loss Prediction
Safe Security's Interactive Cost Model was tested against eight recent ransomware attacks for which financial impact data was available.
The Uber Breach: Why Real-Time Monitoring of Signals Across Your Attack Surface is Crucial
The cyber attack on Uber demonstrates that organizations must monitor their expanding attack surface and correlate your security signals in real-time.
Enterprise Management Associates: Impact Brief on Safe Security
Safe Security, an American company headquartered in Palo Alto that specializes in cybersecurity and digital business risk quantification, recently announced the release of several new assessment
Empowering the CFO to Champion Cyber Risk Management
CFOs play a pivotal role in determining the cyber health of a company and ensuring cybersecurity investment matches potential risks.
From Bits & Bytes to Dollars & Cents: Taking a New Approach to Cybersecurity Risk Management
The conversation around cyber security has changed, from prevention to risk management. But what is the financial impact of this new approach?
Lloyds of London Excludes State-Backed Cyber Attacks from Insurance Coverage
Find out what this major policy exclusion means for global businesses and the insurance industry, as we explore the solution.
Halve the Cost of a Data Breach with Cyber Risk Quantification
The Ponemon Institute and IBM list CRQ and security AI and automation as the top 2 methods for reducing breach losses in the 2022 Cost of a Data Breach report.
Safe CRQ Calculator
Ever wondered how exposed your industry is to cyber risk, or how it compares to others? Use our FREE Cyber Risk calculator to find out.
How CISOs can Answer Gartner’s Top 5 Board Questions using Cyber Risk Quantification
Cyber risk has tangible financial and operational consequences for a business. Learn how to tackle Gartner’s top 5 cyber risk questions using Risk Quantification.
CRQ 101: What is Cyber Risk Quantification?
Discover how CRQ enables you to assess, prioritize, and manage cyber risk in real-time, and contextually communicate cybersecurity risk to your Board.
Okta Breach and Third Party Cybersecurity: Addressing TPRM with Risk Quantification
The Okta Breach serves a reminder of how critical it is to mitigate third party risk. So what's the solution? Explore the power of Cyber Risk Quantification.
SEC Cyber Risk Proposal: A Call for Cyber Risk Quantification?
The SEC suggests landmark changes to cyber risk management within public companies. Read this snapshot for the full 101 on what it means and how to respond.
Protecting Critical Infrastructure During Times of Conflict
The Russia-Ukraine conflict highlights the need for a proactive approach to cybersecurity risk if we are to keep critical infrastructure safe.
How to Prioritize and Allocate Your Cybersecurity Resources using SAFE
Cybersecurity teams have finite time, budget, and resources. Find out how to identify where you'll get the most return and prevent successful attacks.
How to Protect Your Crown Jewels: Quantifying Risk Within Critical Infrastructure
In this blog, we will explore how security teams can reduce the attack surface of critical infrastructure with a quantified solution across the enterprise.
Third-Party Risk Management is Ready For Breach-Likelihood Scores
Traditional third-party risk management is inefficient. Read this blog to understand why third-party risk management needs a modern approach.
6 Top Considerations for CISOs Investing in Cybersecurity
Read this blog to better understand what are the 6 main considerations for CISO's investing in cybersecurity and how a breach-likelihood score can help.
Cybersecurity and Financial Services: Thinking outside the Assessment checkbox
Explore the role of cybersecurity in the BFSI sector and how you can accurately quantify cyber risks to determine the likelihood of a cyber breach.
How Likely is Your Hospital to be Hacked?
Learn how likely is your hospital to be hacked or cyber breached and why you can trust the SAFE score to assess your cyber risk posture.