<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

Cybersecurity 101 (4)

A Guide to Funds Transfer Fraud

Learn about securing funds transfers, out-of-band authentication, and how to avoid becoming the next victim of funds transfer fraud in this cyber blog.

Cyber Insurance Coverage & Terminology Guide

Expand your knowledge of cybersecurity best practices, threat actors, and data breaches to better understand cyber insurance policy terminology.

Cybersecurity Strategies for Small- and Medium-Sized Businesses

For too long, misconceptions about cyber risk have prevented serious mitigation efforts by SMBs. How are they catching up?

Your Survival Guide to the DDoS Resurgence

DDoS is back in the news. What is it about these attacks that make them a popular choice among threat actors, and how do we fight it?

Small Businesses: How to Improve Your Security on a Budget

Good security is complex but achievable (even on a budget). Find out how to reduce the damage even the most innovative criminals can bring in this blog.

Identify, Attract & Retain: 3 Steps to Solve Your Cyber Talent Problem

We've gathered three unique perspectives on your most pressing cyber talent questions. Learn more in this short blog.

Cyber Threats: 2021 in Review

Our roundup of this year's cybersecurity highs (what are we collectively doing right?) and the lows (what do we need to watch for in 2022?)

The Future of Insurance Distribution: Corvus Interview

We spoke with Sam Kramer and Nathan Walsh to learn about alternative distribution models and what the future of insurance distribution looks like.

CISO Update: What We Know About the Log4j Vulnerability

On December 10, 2021, Apache published details of the CVE-2021-44228 vulnerability in the Log4j utility. Here's what we know so far, and our suggestions.

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

After a breach, tech companies face potential legal action from customers. How do we determine the risk factors for litigation, and what are our findings?