Corvus Insights

Deep Dive: The 3 Keys to a Successful Cyber Incident Response

Deep Dive: The 3 Keys to a Successful Cyber Incident Response

Ask any CISO and they’ll tell you dealing with the immediate challenges of an active cyber incident is only half the battle (less, actually). An effective response requires a well-executed strategy that covers both ...

Read more
Graph Your Dependencies: Outages like Facebook Prove “Simple” Doesn’t Cut It

Graph Your Dependencies: Outages like Facebook Prove “Simple” Doesn’t Cut It

On October 4, 2021, a faulty configuration change impacted 3.5 billion people. 

Read more
The ABCs of 3-2-1 Backups

The ABCs of 3-2-1 Backups

We’ve got the fundamentals down: ransomware is a major concern, and threat actors target backups to encrypt or delete them. On the bright side, It appears there’s increasing awareness for the latter, as we have seen ...

Read more
Cyber Coverage Explained: Contingent Business Interruption

Cyber Coverage Explained: Contingent Business Interruption

We're diving into the details of a key insuring agreement to help brokers better understand their clients' cyber coverage. 

Read more
Prioritize Patching: A Risk-Based Vulnerability Management Approach

Prioritize Patching: A Risk-Based Vulnerability Management Approach

Risk-Based Vulnerability Management (RBVM) - a better way to add context to your vulnerability management program. 

Read more
How Tech Companies Can Enhance Their Security: 5 High-Impact Practices

How Tech Companies Can Enhance Their Security: 5 High-Impact Practices

At Corvus, our risk & response experts work with policyholders and cybersecurity partners to implement measures that mitigate risk for their organizations, including with Smart Tech E&O policyholders. 

Read more

Deep Dive: The 3 Keys to a Successful Cyber Incident Response

Ask any CISO and they’ll tell you dealing with the immediate challenges of an active cyber incident is only half the battle (less, actually). An effective response requires a well-executed strategy that covers both before and after an incident to limit both major disruption to operations and financial harm. 

READ THE BLOG