Corvus Insights

Deep Dive: The 3 Keys to a Successful Cyber Incident Response Strategy

Deep Dive: The 3 Keys to a Successful Cyber Incident Response Strategy

Ask any CISO and they’ll tell you dealing with the immediate challenges of an active cyber incident is only half the battle (less, actually). An effective response requires a well-executed strategy that covers both ...

Read more
Graph Your Dependencies: Outages like Facebook Prove “Simple” Doesn’t Cut It

Graph Your Dependencies: Outages like Facebook Prove “Simple” Doesn’t Cut It

On October 4, 2021, a faulty configuration change impacted 3.5 billion people. 

Read more
The ABCs of 3-2-1 Backups

The ABCs of 3-2-1 Backups

We’ve got the fundamentals down: ransomware is a major concern, and threat actors target backups to encrypt or delete them. On the bright side, It appears there’s increasing awareness for the latter, as we have seen ...

Read more
Cyber Coverage Explained: Contingent Business Interruption

Cyber Coverage Explained: Contingent Business Interruption

We're diving into the details of a key insuring agreement to help brokers better understand their clients' cyber coverage. 

Read more
Prioritize Patching: A Risk-Based Vulnerability Management Approach

Prioritize Patching: A Risk-Based Vulnerability Management Approach

Risk-Based Vulnerability Management (RBVM) - a better way to add context to your vulnerability management program. 

Read more
How Tech Companies Can Enhance Their Security: 5 High-Impact Practices

How Tech Companies Can Enhance Their Security: 5 High-Impact Practices

At Corvus, our risk & response experts work with policyholders and cybersecurity partners to implement measures that mitigate risk for their organizations, including with Smart Tech E&O policyholders. 

Read more

How to Identify, Attract and Retain: 3 Steps to Solve Your Cyber Talent Problem

Threat actors show no signs of slowing down. And as long as they continue to make a profit, we shouldn’t expect that to change anytime soon. Unfortunately, for all of us that aren’t actively deploying ransomware, we’re stuck playing multiple roles: technology experts, defenders, and part-time psychics. 

Along with that, cyber insurers are now placing more responsibility on the policyholder’s shoulders, making certain security controls non-negotiable if you want to be insured. It benefits both parties, but there’s an obvious burden of time, expertise and finances to implement measures that boost your cyber hygiene. Our Risk + Response team talks to dozens of policyholders a month, and many are realizing that as they invest in better security measures, they’ll need the personnel to carry out their plans. 

READ THE BLOG