Now we know where cyber Insurance money is going…

We have Always been big fans of the Verizon Data Breach Investigations Report. And we love this years’ edition even more than before because of these findings:

…it shows that the majority of the insurance payouts go toward costs within the phase of breach recovery associated with determining just which creek you are up and your current paddle supply. Legal guidance during the crisis management phase and forensics investigations are where the majority of the cash is going.

Insurance payout
Source: Verizon DBIR 2016, page 65

Now who told you to reconsider the need for a so-called cyberinsurance when it covers the costs of your lawyer only… Ahh, yes, we did…

Lesson learned: better invest your money in simple security controls (like better security awareness and adequate patchmanagement) and of course #ditchcyber!

Cyberspace becomes a better place

Last week we learned that norse corp is on the brink of implosion. The firm that became famous for it’s live cyber attack map, seems to be in deep trouble. Pity for the investors, like KPMG, the company seems to lose track. Yes, having a map doesn’t imply that you know where to go.

Let’s hope the map dies in peace, making internet a safer place. We can live more freely without Fear, Uncertainty and Doubt.

Our 2016 CyberXpert cybersecurity predictions

It’s that time of the year again, renowned security experts are lined up to give you the tools to substantiate your cybersecurity budget claim for 2016. We too are inclined to help you to show that cyber is very important. Here we go:

Data breaches

The EU helps us to redefine the term data breaches. Hence more breaches will be recognized. And the cause of data breaches: misconfigured ICT components, lacking patch management procedures and the human factor. People fall victim to social engineering attacks. Yes, they still do. And, as Always, corporate management. Still too little and too late aware of security risks.


Since more and more components are mobile devices, we might need to take more care of our devices , especially since we use them for authentication purposes and mobile (nfc) payments. Mobile devices are more valuable than ever. Hackers will hack into your mobile. Do they?
Anuway the cause will be: misconfiguration and the eternal human factor. Theft. Loss. And people like jailbreaking and rooting devices for extra features. And less security…


Yes, they are so advanced, that now they hide in traditional attacks like phishing attacks. The cause? Mostly your own and other governments…


Ah, yes. The eternal ransomware. Heartless criminals know how to social engineer into your organization. Bad, bad. There are tools to prevent vulnerabilities. Or move to Linux, or CBM64.

DNS and so on

Criminals DDoS the internet infrastructure. Bad? Yes, but if your services are not accessible, they are not vulnerable, are they? So DDoS may well be the best protection against data breaches…


Other experts’ opinions



If you are a renowned expert and if you 2016 cybersecurity predictions post is not mentioned, don’t hesitate to post the link in the comments section…



Ah, yes, where is the cyber in this post? There is no cyber, we #ditchcyber

Do you really need Cyber liability insurance?

“Cyber liability insurance is becoming an increasing necessity” claims a Tripwire report. And the net-security article mentions a KPMG survey that reports that over 74% of businesses do not have a cyber security liability insurance. And that less than half of thoses who do, are convinced that the insurance will cover the actual costs of a breach.

So, this clearly marks the start of a new campaign to open a new, profitable market for insurance companies.

But it’s another poor try by the cyber industry. Apart from the fact that current cyber insurance offerings are immature, there is a bigger problem. As we stated earlier (like here and here), most breaches are not due to unexpected attacks on the internet, most companies do not fall victim of an attack. Most breaches occur because of failing internal, organisational and technical controls. And will insurance companies cover your own failures? Traditional insurance doesn’t cover theft if a homeowner didn’t lock his house. Same for cyber. Same small print. And when the insurance markets is maturing, we can expect a lot more small print.

#ditchcyber and if your cyber consultant wants you to insure your cyber risk, ditch your consultant too.

You see, Cyberspace is under attack

So, you want to know how bad it is, out there in cyberspace?

Here are the live maps…

Norse Corp Cyberattack map    norsemap

Kaspersky Cyberthreat Real-time map     kasperskymap

FireEye Cyber Threat map   fireeyemap

Global Security Map   globalmap

Honeynet Project   honeypotmap

Akamai Real Time Web monitor (Attack tab)   akamaimap

Google and Arbor Digital Attack Map   digattmap


No, we have no clue what it all means, but it must be very bad in cyberspace.

Anyway, these sites are great time wasters! And of course: #ditchcyber is the best recipe.


Trusted domain

Here we are, running a new SSL server certificate. Trusted by most browsers. No, we’re not running a self-signed certificate anymore.

This site is running WordPress CMS on a Hiawatha webserver. Installing this secured setup is quite easy if you follow the instructions on this site:

And if you get a public certificate the testresults look like this:





Next step will be a migration to the Banshee PHP framework. We’ll keep you informed.

Untrusted domain

You will have noticed that we installed an SSL certificated on this server. Why is that? First of all: we’re into security, so a certificate is nice to have. Then google promised us that we will be found much easier if we install a certificate. And since we try to share knowledge, it’s nice to be found. And last but not least, when we login to our site, our credentials are transmitted encrypted.

But you will have noticed that our certificate is not trusted by your browser. Glad so, because we created the certificate ourselves. And noone needs to trust us. That’s why you have to explicitly tell your browser to display the site, no matter what risk…

We will install a trusted certificate shortly, but a trustworthy certificate provider wants to validate the domain and so will send an email to our webmaster.  But that requires an email address… that we don’t have yet. So, be patient, we’ll get there in the end 🙂


The new CyberXpert website

You may not have noticed it, but we just moved the CyberXpert website to a new server and to a new webserver platform as well. We moved the wordpress content management system from an Apache webserver to Hiawatha webserver. Like Apache, Nginx and other webservers, Hiawatha is an open source webserver, with a twist. It was build by a security expert. And not only is it a very secure platform, it is lean and fast at the same time.hiawatha_logo

You can learn all about Hiawatha webserver at the Hiawatha project site.