Corvus Insights

Corvus Updates Scan with RDP Detection, Cuts Ransomware Claims by 65%

Corvus Updates Scan with RDP Detection, Cuts Ransomware Claims by 65%

With version 2.0 of the Corvus Scan, Corvus works with Brokers and Policyholders to reduce Ransomware Claims.

Read more
3 Reasons IT Vendors Are a Bigger Cyber Risk Than You Think

3 Reasons IT Vendors Are a Bigger Cyber Risk Than You Think

The following is an adapted excerpt from a new Corvus Ultimate Guide for brokers on how they and their clients should handle a breach situation that's due to a third-party. Click to download the full paper, free. 

Read more
[WEBINAR] Business Email Compromise: (Unfortunately) Easy as 1, 2, 3

[WEBINAR] Business Email Compromise: (Unfortunately) Easy as 1, 2, 3

Business Email Compromise (BEC) is perennially a top cybersecurity attack vector. Why? Because, unfortunately, it’s relatively easy for criminals to carry out, and it works. 

Read more
Client Breach Response: The Impact of Capital One’s Legal Battle

Client Breach Response: The Impact of Capital One’s Legal Battle

To learn more about how this case may change how companies handle breach response, we’re talking to Pasha Sternberg, an attorney at Polsinelli PC who specializes in handling cyber incidents.

Read more
Supply Chain Chaos is Ramping Up Cyber Risk

Supply Chain Chaos is Ramping Up Cyber Risk

This piece appeared in Security Magazine in August 2020

Read more

How to Identify, Attract and Retain: 3 Steps to Solve Your Cyber Talent Problem

Threat actors show no signs of slowing down. And as long as they continue to make a profit, we shouldn’t expect that to change anytime soon. Unfortunately, for all of us that aren’t actively deploying ransomware, we’re stuck playing multiple roles: technology experts, defenders, and part-time psychics. 

Along with that, cyber insurers are now placing more responsibility on the policyholder’s shoulders, making certain security controls non-negotiable if you want to be insured. It benefits both parties, but there’s an obvious burden of time, expertise and finances to implement measures that boost your cyber hygiene. Our Risk + Response team talks to dozens of policyholders a month, and many are realizing that as they invest in better security measures, they’ll need the personnel to carry out their plans. 

READ THE BLOG