<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

Cybersecurity 101 (3)

A Guide to Threat Detection

What are the best practices and resources to help your organization detect cyber threats early and respond? Find out in this short cybersecurity blog!

What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

Our underwriters are constantly looking ahead to help our broker partners and their clients prepare for what’s next. What are they seeing in the field?

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

When looking at systemic risk, we shouldn't only focus on the major SaaS players. In fact, the less-universal solutions are a more common vector of attack.

Cyber Threats: 2022 in Review (& What to Expect from 2023)

With 2022 in the rearview, we'll explore our successes in combatting risk and our concerns for the future. Learn more in this cyber blog.

A Guide to Endpoint Detection Response (EDR)

What are the best practices and resources to help your organization implement Endpoint Detection Response (EDR)? Find out in this short cybersecurity blog!

A Guide to Zero Trust Network Access (ZTNA)

Find out how secure remote access methods such as ZTNA can help improve your cybersecurity program, applications, and services in this short cyber blog.

A Guide To Securing Email at Your Organization

What are the best practices and resources to help secure your organization’s email system? Find out in this short cybersecurity blog!

How to Respond to a Cyber Incident

What steps does Corvus recommend you take at each stage of cyber incident response? Find out in this short cybersecurity blog!

A Chilling Tale of How Data Exfiltration Attacks Happen

Learn about how data extortion attacks happen (and how you can prevent them) as we tell the story of Parakeet Inc. around our (theoretical) campfire.

Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

By using data from various companies, Corvus determined the likelihood of a security incident based on whether they used a high-risk or low-risk VPN.