<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

In the Binoculars: Barrett Heacock, Chief Financial Officer

We sat down with Barrett to discuss his future goals for Corvus, his experience with high-growth companies, and more.

Small Businesses: How to Improve Your Security on a Budget

Good security is complex but achievable (even on a budget). Find out how to reduce the damage even the most innovative criminals can bring in this blog.

Identify, Attract & Retain: 3 Steps to Solve Your Cyber Talent Problem

We've gathered three unique perspectives on your most pressing cyber talent questions. Learn more in this short blog.

Cyber Coverage Explained: Sub-limits and Coinsurance

Corvus is covering the growing prevalence of sub-limits and coinsurance in policies where there may not have been a few years ago. Why is it happening?

Cyber Threats: 2021 in Review

Our roundup of this year's cybersecurity highs (what are we collectively doing right?) and the lows (what do we need to watch for in 2022?)

The Future of Insurance Distribution: Corvus Interview

We spoke with Sam Kramer and Nathan Walsh to learn about alternative distribution models and what the future of insurance distribution looks like.

CISO Update: What We Know About the Log4j Vulnerability

On December 10, 2021, Apache published details of the CVE-2021-44228 vulnerability in the Log4j utility. Here's what we know so far, and our suggestions.

Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime

Social engineering & cybercrime coverage is complicated. What are social engineering attacks, and how do you find the right insurance coverage agreement?

At Thanksgiving: Gratitude and Hope for a Safer World

At Corvus, we have a lot be thankful for. We've sought ways throughout the year to return the favor to all who've helped us.

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

After a breach, tech companies face potential legal action from customers. How do we determine the risk factors for litigation, and what are our findings?