<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

Cyber Threats: 2021 in Review

Our roundup of this year's cybersecurity highs (what are we collectively doing right?) and the lows (what do we need to watch for in 2022?)

The Future of Insurance Distribution: Corvus Interview

We spoke with Sam Kramer and Nathan Walsh to learn about alternative distribution models and what the future of insurance distribution looks like.

CISO Update: What We Know About the Log4j Vulnerability

On December 10, 2021, Apache published details of the CVE-2021-44228 vulnerability in the Log4j utility. Here's what we know so far, and our suggestions.

Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime

Social engineering & cybercrime coverage is complicated. What are social engineering attacks, and how do you find the right insurance coverage agreement?

At Thanksgiving: Gratitude and Hope for a Safer World

At Corvus, we have a lot be thankful for. We've sought ways throughout the year to return the favor to all who've helped us.

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

After a breach, tech companies face potential legal action from customers. How do we determine the risk factors for litigation, and what are our findings?

In the Binoculars: Michelle Darby, Senior Manager of Software Engineering

We sat down with Michelle to get her perspective on growth at Corvus, what goes into fostering a positive culture, and more.

Tips from Top Brokers: How to Play Offense in a Cyber Hard Market

What does it mean to be a broker in a cyber hard market, and how do you succeed? Find out in this short blog!

Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

In the wake of remote work and the rise of ransomware, how did the use of security tools, management, and preparedness vary across sectors?

The 3 Keys to a Successful Cyber Incident Response Strategy

An effective cyber incident response strategy requires a well-executed plan before and after an incident. Here are the 3 key steps to success.