<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

The Privacy Problem: A Conversation on Pixel Tracking with Experts from BakerHostetler

With experts from BakerHostetler, we explore prior and current website tracking litigation, and how it impacts non-regulated industries. 

Highlight Reel: Our Most-Read Blogs of 2022

Before we address the new risks of 2023, we wanted to take a moment to reflect on the blogs that piqued the interest of brokers and policyholders in 2022.

Cyber is insurable, and it’s a watershed moment for our industry

Getting cyber insurance “right” isn’t just a good business opportunity — it’s also a make-or-break moment for the industry.

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

When looking at systemic risk, we shouldn't only focus on the major SaaS players. In fact, the less-universal solutions are a more common vector of attack.

Cyber Threats: 2022 in Review (& What to Expect from 2023)

With 2022 in the rearview, we'll explore our successes in combatting risk and our concerns for the future. Learn more in this cyber blog.

What is RDP and why is it a security concern?

Learn more about Remote Desktop Protocol (RDP), its risks, and how to help your client properly secure their infrastructure in this cybersecurity blog.

Tracking Pixel Technology: Everything You Need To Know

What is pixel ad tracking technology and why is it involved in a plethora of class action lawsuits? Learn more about the problem with pixel.

In the Binoculars: Safer World Sabbatical with Corvus Software Engineer Aaron Votre

For his Sabbatical, Aaron headed to Tanzania, a country in East Africa. Learn more in our latest Q&A. 

A Guide to Endpoint Detection Response (EDR)

What are the best practices and resources to help your organization implement Endpoint Detection Response (EDR)? Find out in this short cybersecurity blog!

A Guide to Zero Trust Network Access (ZTNA)

Find out how secure remote access methods such as ZTNA can help improve your cybersecurity program, applications, and services in this short cyber blog.