Platform capability

Cyber insurance risk intelligence

Insurers need source-backed current exposure and claims context, not only historical loss curves or opaque scores.

Direct answer

Is this actuarial advice? No. PhishNet provides source-backed exposure, event and evidence context for underwriting and claims teams.

Underwriting

Externally observable security posture before bind: DNS, mail authentication, TLS, exposed services, CVE/banner context, credential exposure and phishing pressure.

Evidence trail

PhishNet links signals to evidence observations, source readiness, collection method, target context, manifests and safe derived features.

Claims and monitoring

Ransomware victim mentions, breach disclosures, regulator records, incident news, sensor summaries and evidence vault links support in-life context.

Portfolio modeling

Technology stack, vendor concentration, sector benchmarks and accumulation views cover Microsoft 365, CDN, IdP, mail provider and exposed-product dependencies.

Commercial path

Request a company lookup, sector benchmark or portfolio sample export.

How PhishNet uses this

Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.

Selected sources and research

These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.

Common questions

Is this actuarial advice?

No. PhishNet provides source-backed exposure, event and evidence context for underwriting and claims teams.

Can raw evidence be reviewed?

Authenticated operators can review vault artifacts according to role, policy and audit controls; public pages expose only safe summaries.

Related reading