Corvus Insights


CISO Update: What We Know About the Log4j Vulnerability

CISO Update: What We Know About the Log4j Vulnerability



Updated Monday December 13, 10:45 am ET On December 10, 2021, Apache published details of the CVE-2021-44228 vulnerability in the Log4j utility — an open source Java package managed by Apache. For background, the Log4j ...

Read more
Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime Coverage

Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime Coverage



This post was originally published December 2020 and was updated in December 2021. I explained how social engineering attacks can disrupt businesses in a video that covers several common first-party insuring agreements. ...

Read more
Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact



The rise of remote work and growing concerns over ransomware acted as partners-in-crime to get organizations to hone in on risk mitigation efforts over the past couple years. Through compiling our Risk Insights Index, ...

Read more
Tips from Top Brokers: How to Play Offense in a Cyber Hard Market

Tips from Top Brokers: How to Play Offense in a Cyber Hard Market



The whisperings of “firming rates” start first, quietly in business meetings, then published in industry reports. Soon to follow, rumblings of a “hard market” are brought to the conversation. It’s cyclical in nature, ...

Read more
Cyber Risk, IT tools, and Ransomware Trends (Oh My!): Analysis from Pre-Pandemic to 2021

Cyber Risk, IT tools, and Ransomware Trends (Oh My!): Analysis from Pre-Pandemic to 2021



Below, we’ve highlighted some of the data that intrigued us most from our inaugural Corvus Risk Insights Index. To see all of our findings, you can download the full Index here!

Read more
Deep Dive: The 3 Keys to a Successful Cyber Incident Response Strategy

Deep Dive: The 3 Keys to a Successful Cyber Incident Response Strategy



Ask any CISO and they’ll tell you dealing with the immediate challenges of an active cyber incident is only half the battle (less, actually). An effective response requires a well-executed strategy that covers both ...

Read more

How to Prepare for a Cyber Hurricane: 3 Key Takeaways

What’s the difference between your most overprepared travel buddy and a cybersecurity pro? 

READ THE BLOG