<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

Highlight Reel: Our Most-Read Blogs of 2022

Before we address the new risks of 2023, we wanted to take a moment to reflect on the blogs that piqued the interest of brokers and policyholders in 2022.

Cyber is insurable, and it’s a watershed moment for our industry

Getting cyber insurance “right” isn’t just a good business opportunity — it’s also a make-or-break moment for the industry.

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

When looking at systemic risk, we shouldn't only focus on the major SaaS players. In fact, the less-universal solutions are a more common vector of attack.

Cyber Threats: 2022 in Review (& What to Expect from 2023)

With 2022 in the rearview, we'll explore our successes in combatting risk and our concerns for the future. Learn more in this cyber blog.

Tracking Pixel Technology: Everything You Need To Know

What is pixel ad tracking technology and why is it involved in a plethora of class action lawsuits? Learn more about the problem with pixel.

In the Binoculars: Safer World Sabbatical with Corvus Software Engineer Aaron Votre

For his Sabbatical, Aaron headed to Tanzania, a country in East Africa. Learn more in our latest Q&A. 

Cyber Insurance Defined: Traditionally, and Now

We’ll explore the traditional role cyber coverage plays in protecting your organization and how the very definition of “cyber insurance” has changed.

How Inside-out Insights Shape Cyber Risk Assessment

Corvus is continuing our work building an active ecosystem of partners that will help identify and respond to cyber risks.

In the Binoculars: Jason Rebholz, Chief Information Security Officer

Join us as we discuss Jason's career background, journey to cyber insurance, and his hopes for the future of cybersecurity (hint: it’s about empathy).

A Chilling Tale of How Data Exfiltration Attacks Happen

Learn about how data extortion attacks happen (and how you can prevent them) as we tell the story of Parakeet Inc. around our (theoretical) campfire.