{"id":8003,"date":"2022-09-14T08:29:17","date_gmt":"2022-09-14T15:29:17","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8003"},"modified":"2022-09-14T09:14:26","modified_gmt":"2022-09-14T16:14:26","slug":"what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/","title":{"rendered":"What To Do About Cyber Insurance Trying To Exclude Nation-State Attacks From Coverage"},"content":{"rendered":"<p>Enterprise security teams and cyber insurance companies have historically played a cat and mouse game with the insurance companies trying to do whatever they can to limit what they have to pay.<\/p>\n<p>In the last few years, many of the largest cybersecurity companies have insisted on a very stringent list of security defenses that enterprises must prove they have before they are even allowed to discuss signing up for coverage.<\/p>\n<p>The latest wrinkle comes from one of the planet\u2019s largest cyber insurance companies. This insurer is trying to exclude any nation state attacks from coverage, a move quite likely to be replicated by other major insurers.<\/p>\n<p>This particular insurance company \u201cremains strongly supportive of the writing of cyber-attack cover but recognizes also that cyber related business continues to be an evolving risk. If not managed properly, it has the potential to expose the market to systemic risks that syndicates could struggle to manage,\u201d the insurer\u2019s underwriting director wrote in an Aug. 16 (2022) market bulletin. \u201cIn particular, the ability of hostile actors to easily disseminate an attack, the ability for harmful code to spread, and the critical dependency that societies have on their IT infrastructure, including to operate physical assets, means that losses have the potential to greatly exceed what the insurance market is able to absorb.\u201d<\/p>\n<p>The underwriting director then said that it is now requiring \u201ca suitable clause excluding liability for losses arising from any state backed cyber-attack.\u201d<\/p>\n<p>There are several problems with this approach. First, it is almost impossible to prove that an attack was indeed a nation state attack. Not only do large scale attacks obfuscate their point of origin in many different ways, but even legitimate nation state attacks typically use third-party cyber attackers, who also engage in their own private attacks. Even if one was somehow able to prove that an attacker who often works for perhaps China or North Korea or Russia was the culprit, how could it possibly be proven whether the attacker did it for their own purposes or whether they did it on behalf of a government client.<\/p>\n<p>There is some good news, at least as far as this insurer is concerned. They have published sample language of such an exclusion. The most encouraging line: \u201cThe insurer shall have the burden of proving that this exclusion applies.\u201d<\/p>\n<p>That is critical. Given how difficult proving that an attack is a state-based attack, the fact that they are assuming the burden of proof is a massive gift to enterprises.<\/p>\n<p>Secondly, the sample wording says that the first factual reliance is based on law enforcement attributing the attack to a nation state. \u201cThe primary but not exclusive factor in determining attribution of a cyber operation shall be whether the government of the state\u2013including its intelligence and security services\u2013in which the computer system affected by the cyber operation is physically located attributes the cyber operation to another state or those acting on its behalf.\u201d<\/p>\n<p>In short, this means that if the FBI publicly declares that the attack is a nation-state attack, this insurer will have cover to deny coverage. For the enterprise CISO, this means working closely with law enforcement and insisting that they publicly share any guesses or suspicions but limit their comments to what can be proven in a U.S. court.<\/p>\n<p>Why a U.S. court? Because if a random FBI comment causes the enterprise to lose millions of dollars\u2019 worth of insurance compensation, they need to know that they will have to defend that conclusion in court.<\/p>\n<p>The insurer also made clear that it is on the investigative hook to prove whether or not it was a cyberattack if law enforcement doesn\u2019t.<\/p>\n<p>\u201cIn the event that the government of the state (including its intelligence and security services) in which the computer system affected by the cyber operation is physically located either takes an unreasonable length of time to or declares it is unable to attribute the cyber operation to another state or those acting on its behalf, it shall be for the insurer to prove attribution by reference to such other evidence as is available.\u201d<\/p>\n<p>Dare I say, but this is a wee bit of this insurer trying to have its cyber-liability cake and eat it, too. They are saying that they will rely on law-enforcement investigating and concluding where the attack came from. But if law enforcement doesn\u2019t say or if it says that it was not a state attack, then they will just ignore that and try and prove attribution some other way.<\/p>\n<p>There is, however, a far bigger problem with this kind of exclusion. State attacks are becoming common. For a cyber insurance company to exclude a state attack from coverage is akin to a health insurance policy excluding coverage for broken bones.<\/p>\n<p>This insurer is trying to associate their state-actor-exclusion with the common insurance exclusion of war. But the two concepts couldn\u2019t be any further apart. The war exclusion was designed to exclude coverage of another country\u2013where an actual declaration of war has been issued\u2013from bombing the insured. That is rare enough and foreseeable enough to merit exclusion pending a custom-written supplement.<\/p>\n<p>But nation-state attacks are becoming common and, more to the point, that is precisely the kind of high-level attack that cyber insurance was created to cover. If North Korea wants to shut down Wall Street for a day and attacks the largest financial players to do so, why is that a reasonable insurance exclusion?<\/p>\n<p>Let\u2019s get back to how most state cyberattacks happen. They typically have a group of experienced cyber attackers that they contract for various attacks. These attackers are rarely on the salary of those governments and, critically, they also mount attacks against people and companies for their own benefit.<\/p>\n<p>Courtesy of the actual government projects, they will often have the money to purchase high-end systems\u2013including banks of systems\u2013to facilitate massive attacks. In other words, the state finances their infrastructure to enable them to do their bidding. Therefore, just because the same people that were involved in an attack from, let\u2019s say, Russia a month ago and involved in this attack, that doesn\u2019t necessarily mean it\u2019s an attack from Russia. The freelance cyberterrorists could be doing this particular attack on their own.<\/p>\n<p>Shy of getting a sworn deposition from the freelance attacker clarifying the matter\u2013yeah, that\u2019s not happening\u2013it\u2019s nearly impossible to positively determine if it was a state attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise security teams and cyber insurance companies have historically played a cat and mouse game with the insurance companies trying to do whatever they can to limit what they have to pay. In the last few years, many of the largest cybersecurity companies have insisted on a very stringent list of security defenses that enterprises [&hellip;]<\/p>\n","protected":false},"author":332,"featured_media":7403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[757,758,665,406,361],"class_list":{"0":"post-8003","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cyber-insurance","9":"tag-nation-state-attacks","10":"tag-cyber-attack","11":"tag-ciso","12":"tag-network-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Nation-State Cyber Attacks Excluded From Insurance Coverage: What to Do About It | Infoblox<\/title>\n<meta name=\"description\" content=\"Insurance companies tend to do whatever they can to limit what they pay. Learn how to combat lack of coverage for nation state cyber attacks in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What To Do About Cyber Insurance Trying To Exclude Nation-State Attacks From Coverage\" \/>\n<meta property=\"og:description\" content=\"Insurance companies tend to do whatever they can to limit what they pay. Learn how to combat lack of coverage for nation state cyber attacks in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-14T15:29:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-14T16:14:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1189\" \/>\n\t<meta property=\"og:image:height\" content=\"619\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evan Schuman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evan Schuman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/\"},\"author\":{\"name\":\"Evan Schuman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\"},\"headline\":\"What To Do About Cyber Insurance Trying To Exclude Nation-State Attacks From Coverage\",\"datePublished\":\"2022-09-14T15:29:17+00:00\",\"dateModified\":\"2022-09-14T16:14:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/\"},\"wordCount\":1097,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IT-updates-3.jpg\",\"keywords\":[\"Cyber insurance\",\"nation-state attacks\",\"Cyber attack\",\"CISO\",\"Network Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/\",\"name\":\"Nation-State Cyber Attacks Excluded From Insurance Coverage: What to Do About It | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IT-updates-3.jpg\",\"datePublished\":\"2022-09-14T15:29:17+00:00\",\"dateModified\":\"2022-09-14T16:14:26+00:00\",\"description\":\"Insurance companies tend to do whatever they can to limit what they pay. Learn how to combat lack of coverage for nation state cyber attacks in this article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IT-updates-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IT-updates-3.jpg\",\"width\":1189,\"height\":619},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What To Do About Cyber Insurance Trying To Exclude Nation-State Attacks From Coverage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4b67c126705c47aec959d64a22de183c\",\"name\":\"Evan Schuman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_332_1578432080-96x96.jpg\",\"caption\":\"Evan Schuman\"},\"description\":\"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/evan-schuman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Nation-State Cyber Attacks Excluded From Insurance Coverage: What to Do About It | Infoblox","description":"Insurance companies tend to do whatever they can to limit what they pay. Learn how to combat lack of coverage for nation state cyber attacks in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/","og_locale":"en_US","og_type":"article","og_title":"What To Do About Cyber Insurance Trying To Exclude Nation-State Attacks From Coverage","og_description":"Insurance companies tend to do whatever they can to limit what they pay. Learn how to combat lack of coverage for nation state cyber attacks in this article.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/","og_site_name":"Infoblox Blog","article_published_time":"2022-09-14T15:29:17+00:00","article_modified_time":"2022-09-14T16:14:26+00:00","og_image":[{"width":1189,"height":619,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","type":"image\/jpeg"}],"author":"Evan Schuman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evan Schuman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/"},"author":{"name":"Evan Schuman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c"},"headline":"What To Do About Cyber Insurance Trying To Exclude Nation-State Attacks From Coverage","datePublished":"2022-09-14T15:29:17+00:00","dateModified":"2022-09-14T16:14:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/"},"wordCount":1097,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","keywords":["Cyber insurance","nation-state attacks","Cyber attack","CISO","Network Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/","url":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/","name":"Nation-State Cyber Attacks Excluded From Insurance Coverage: What to Do About It | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","datePublished":"2022-09-14T15:29:17+00:00","dateModified":"2022-09-14T16:14:26+00:00","description":"Insurance companies tend to do whatever they can to limit what they pay. Learn how to combat lack of coverage for nation state cyber attacks in this article.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","width":1189,"height":619},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-to-do-about-cyber-insurance-trying-to-exclude-nation-state-attacks-from-coverage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What To Do About Cyber Insurance Trying To Exclude Nation-State Attacks From Coverage"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4b67c126705c47aec959d64a22de183c","name":"Evan Schuman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_332_1578432080-96x96.jpg","caption":"Evan Schuman"},"description":"Evan Schuman has been a security writer for far longer than he\u2019ll ever admit (OK, since 1988), having penned security stories for Computerworld, SCMagazine, VentureBeat, American Banker, CBSNews.com, HealthcareITNews , StorefrontBacktalk, Pymnts.com and many other sites and corporate blogs. Evan has overseen IT security coverage for InformationWeek as News Editor, for TechWeb as News Editor and as a columnist for eWEEK. He\u2019s also been quoted as a security expert in media ranging from the Wall Street Journal, Forbes, Reuters, BusinessWeek, Time Magazine and U.S. News &amp; World Report to The Washington Post, MSNBC, Ars Technica, CIO Magazine, The Register, CNET, CNN, Boston Globe, Chain Store Age, USA Today, Wired, the Los Angeles Times, Consumer Reports, Dark Reading and the San Francisco Chronicle. He can be reached at eschuman@thecontentfirm.com.","url":"https:\/\/www.infoblox.com\/blog\/author\/evan-schuman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8003"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8003\/revisions"}],"predecessor-version":[{"id":8005,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8003\/revisions\/8005"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7403"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}