Corvus Insights

How to Identify, Attract and Retain: 3 Steps to Solve Your Cyber Talent Problem

How to Identify, Attract and Retain: 3 Steps to Solve Your Cyber Talent Problem

Threat actors show no signs of slowing down. And as long as they continue to make a profit, we shouldn’t expect that to change anytime soon. Unfortunately, for all of us that aren’t actively deploying ransomware, we’re ...

Read more
Cyber Coverage Explained: Sub-limits and Coinsurance

Cyber Coverage Explained: Sub-limits and Coinsurance

Welcome to another edition of our Cyber Coverage Explained series. This week, we're discussing sub-limits and coinsurance as it impacts our current market. For more coverage explainers, you can find our past posts on ...

Read more
Cyber Threats: 2021 in Review

Cyber Threats: 2021 in Review

Back in 2020, we saw ransomware hit the mainstream like never before. The pandemic brought more of us online from our homes, cyberattacks were higher-profile than ever, and news coverage of hefty ransoms encouraged more ...

Read more
The Future of Insurance Distribution: Corvus Interview

The Future of Insurance Distribution: Corvus Interview

Standalone policies facilitated through a retail broker (often with the help of a wholesaler) are the bread and butter of the growing cyber market. This is especially true now as demand skyrockets for higher limits and ...

Read more
CISO Update: What We Know About the Log4j Vulnerability

CISO Update: What We Know About the Log4j Vulnerability

Updated Monday December 13, 10:45 am ET On December 10, 2021, Apache published details of the CVE-2021-44228 vulnerability in the Log4j utility — an open source Java package managed by Apache. For background, the Log4j ...

Read more
Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime Coverage

Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime Coverage

This post was originally published December 2020 and was updated in December 2021. I explained how social engineering attacks can disrupt businesses in a video that covers several common first-party insuring agreements. ...

Read more

How to Identify, Attract and Retain: 3 Steps to Solve Your Cyber Talent Problem

Threat actors show no signs of slowing down. And as long as they continue to make a profit, we shouldn’t expect that to change anytime soon. Unfortunately, for all of us that aren’t actively deploying ransomware, we’re stuck playing multiple roles: technology experts, defenders, and part-time psychics. 

Along with that, cyber insurers are now placing more responsibility on the policyholder’s shoulders, making certain security controls non-negotiable if you want to be insured. It benefits both parties, but there’s an obvious burden of time, expertise and finances to implement measures that boost your cyber hygiene. Our Risk + Response team talks to dozens of policyholders a month, and many are realizing that as they invest in better security measures, they’ll need the personnel to carry out their plans. 

READ THE BLOG