<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Broker resources

Access to resources tailored to cyber insurance brokers such as appetite guides and product information, cybersecurity reports, and emerging cyber insurance trends from Corvus Insurance.

Search for a resource

Filter by
Request Data:
{}
[ARTICLE] Q3 Ransomware Report: Global Ransomware Attacks Up Over 95% From 2022

Report

Q2 '23 Ransomware Report PDF: Global Attacks At All-Time High

1698105600000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Financial Services: Living with a Target on Your Back

Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Manufacturing: If You Build It, Threat Actors Will Come

Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Request Data:
{}
[ARTICLE] Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

Article

Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

1698883200000
Read Article
Request Data:
{}
[ARTICLE] Three Tactics to Combat Next-Gen Social Engineering Schemes

Article

Three Tactics to Combat Next-Gen Social Engineering Schemes

1700006400000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Cyber Insurance Defined: Traditionally, and Now

Article

Cyber Insurance Defined: Traditionally, and Now

1667952000000
Read Article
Request Data:
{}
[ARTICLE] What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

Article

What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

1675987200000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: Sub-limits and Coinsurance

Article

Cyber Coverage Explained: Sub-limits and Coinsurance

1643155200000
Read Article
Request Data:
{}
[ARTICLE] 3 Ways Threat Actors Will Kick Off the New Year

Article

3 Ways Threat Actors Will Kick Off the New Year

1702425600000
Read Article
Request Data:
{}
[ARTICLE] Black Basta Ransomware Has Extracted Over $100 Million From its Victims

Article

Black Basta Ransomware Has Extracted Over $100 Million From its Victims

1698883200000
Read Article
Request Data:
{}
[ARTICLE] Another Record-Breaking Month for Ransomware: November Up 110% YoY

Article

Another Record-Breaking Month for Ransomware: November Up 110% YoY

1702857600000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Healthcare: Treating the Rise of Ransomware

Article

Cyber and Healthcare: Treating the Rise of Ransomware

1702944000000
Read Article
Request Data:
{}
[ARTICLE] Key Ransomware Indicator Up 56% Year-on-Year: October Data

Article

Key Ransomware Indicator Up 56% Year-on-Year: October Data

1699833600000
Read Article
Request Data:
{}
[ARTICLE] Generative AI is here. How does it impact cyber insurance?

Article

Generative AI is here. How does it impact cyber insurance?

1687910400000
Read Article
Request Data:
{}
[ARTICLE] The Privacy Problem: A Conversation on Pixel Tracking with Experts from BakerHostetler

Broker Resource

The Privacy Problem: A Conversation on Pixel Tracking with Experts from BakerHostetler

1674604800000
Read Article
Request Data:
{}
[ARTICLE] A Tale of How Business Email Compromise Attacks Work

Case Study

A Tale of How Business Email Compromise Attacks Work

1648598400000
Read Article
Request Data:
{}
[ARTICLE] Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

Article

Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

1662595200000
Read Article
Request Data:
{}
[ARTICLE] Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

Article

Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

1647907200000
Read Article
Request Data:
{}
[ARTICLE] Common Cyber Insurance Myths, Debunked

Article

Common Cyber Insurance Myths, Debunked

1655337600000
Read Article
Request Data:
{}
[ARTICLE] How Healthcare is Responding to New Guidelines for Pixel Tech

Article

How Healthcare is Responding to New Guidelines for Pixel Tech

1680566400000
Read Article
Request Data:
{}
[ARTICLE] August Ransomware Recap: Sixth Month in a Row with YoY Increase

Article

August Ransomware Recap: Sixth Month in a Row with YoY Increase

1694649600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

Article

Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

1634774400000
Read Article
Request Data:
{}
[ARTICLE] Record Ransomware Attacks: 6-Month Upward Trend Continues in July

Article

Record Ransomware Attacks: 6-Month Upward Trend Continues in July

1691625600000
Read Article
Request Data:
{}
[ARTICLE] While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

Article

While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

1697155200000
Read Article
Request Data:
{}
Corvus_Interview_Modern_Cyber_Warfare_with_John_Hultquist

Article

Corvus Interview: Modern Cyber Warfare with John Hultquist

1661904000000
Read Article
Request Data:
{}
[ARTICLE] The Ransomware Handbook: Cybercriminals in the News

Article

The Ransomware Handbook: Cybercriminals in the News

1664323200000
Read Article
Request Data:
{}
[ARTICLE] How Our Policyholders Avoid Vulnerability Patching Paralysis

Article

How Our Policyholders Avoid Vulnerability Patching Paralysis

1690761600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime

Article

Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime

1638403200000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: Wrongful Collection of Data

Article

Cyber Coverage Explained: Wrongful Collection of Data

1683763200000
Read Article
Request Data:
{}
[ARTICLE] Ransomware Groups Want to Exploit Your File Transfer Software

Article

Ransomware Groups Want to Exploit Your File Transfer Software

1693440000000
Read Article
Request Data:
{}
[ARTICLE] 4 Ways Cyber Brokers Are Embracing Digital Transformation

Article

4 Ways Cyber Brokers Are Embracing Digital Transformation

1663545600000
Read Article
Request Data:
{}
[ARTICLE] Can Cyber Risk Prevention Really Work? Yes, And Here’s How

Article

Can Cyber Risk Prevention Really Work? Yes, And Here’s How

1687305600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Threats: 2022 in Review (& What to Expect from 2023)

Article

Cyber Threats: 2022 in Review (& What to Expect from 2023)

1671494400000
Read Article
Request Data:
{}
[ARTICLE] Cyberwarfare in Ukraine: One Year of Observations

Article

Cyberwarfare in Ukraine: One Year of Observations

1677801600000
Read Article
Request Data:
{}
[ARTICLE] Cyber is insurable, and it’s a watershed moment for our industry

Article

Cyber is insurable, and it’s a watershed moment for our industry

1672963200000
Read Article
Request Data:
{}
[ARTICLE] Corvus Risk Navigator™: How We Supercharge Cyber Underwriters

Article

Corvus Risk Navigator™: How We Supercharge Cyber Underwriters

1675296000000
Read Article
Request Data:
{}
[ARTICLE] Tracking Pixel Technology: Everything You Need To Know

Article

Tracking Pixel Technology: Everything You Need To Know

1670544000000
Read Article
Request Data:
{}
[ARTICLE] Cyber Insurance Coverage & Terminology Guide

Article

Cyber Insurance Coverage & Terminology Guide

1654560000000
Read Article
Request Data:
{}
[ARTICLE] Q2 Ransomware Report: Global Attacks At All-Time High

Article

Q2 '23 Ransomware Report: Global Attacks At All-Time High

1690761600000
Read Article
Request Data:
{}
[ARTICLE] A Chilling Tale of How Data Exfiltration Attacks Happen

Case Study

A Chilling Tale of How Data Exfiltration Attacks Happen

1665532800000
Read Article
Request Data:
{}
[ARTICLE] Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

Article

Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

1660176000000
Read Article
Request Data:
{}
[ARTICLE] 5 High-Impact Cybersecurity Practices for Tech Companies

Article

5 High-Impact Cybersecurity Practices for Tech Companies

1694131200000
Read Article
Request Data:
{}
[ARTICLE] Your Survival Guide to the DDoS Resurgence

Article

Your Survival Guide to the DDoS Resurgence

1646697600000
Read Article
Request Data:
{}
[ARTICLE] Mitigating Vendor Risk: Three Steps to Protect Your Organization

Article

Mitigating Vendor Risk: Three Steps to Protect Your Organization

1619654400000
Read Article
Request Data:
{}
[ARTICLE] The ABCs of 3-2-1 Backup Plans

Article

The ABCs of 3-2-1 Backup Plans

1632873600000
Read Article
Request Data:
{}
[REPORT] Corvus Claims Data Infographic - December 2023

Report

Corvus Claims Data Infographic - December 2023

1704067200000
Read Article
Request Data:
{}
[WEBINAR] Cyberattack Prevention Month

Webinar

Cyberattack Prevention Month

1696118400000
Watch Webinar
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q2 2023 Edition

Report

Corvus Risk Insights Index: Q2 2023 Edition

1682899200000
Read Article
Request Data:
{}
[WEBINAR] When AI and Insurance Collide

Webinar

When AI and Insurance Collide

1680307200000
Watch Webinar
Request Data:
{}
[WEBINAR] Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

Webinar

Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

1672531200000
Watch Webinar
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q4 2022 Edition

Report

Corvus Risk Insights Index: Q4 2022 Edition

1669852800000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: Business Interruption

Article

Cyber Coverage Explained: Business Interruption

1583452800000
Read Article
Request Data:
{}
Request Data:
{}
Cyber_Coverage_Explained_Contingent_Business_Interruption

Article

Cyber Coverage Explained: Contingent Business Interruption

1632787200000
Read Article
Request Data:
{}
[ARTICLE] How We Use AI to Better Understand Tech E&O Risk (Part I of II)

Article

How We Use AI to Better Understand Tech E&O Risk (Part I of II)

1598572800000
Read Article
Request Data:
{}
[ARTICLE] How We Use AI to Better Understand Tech E&O Risk (Part II of II)

Article

How We Use AI to Better Understand Tech E&O Risk (Part II of II)

1599091200000
Read Article
Request Data:
{}
[ARTICLE] Historical Data Won’t Predict Cyber Claims - Here’s What Will

Article

Historical Data Won’t Predict Cyber Claims - Here’s What Will

1553731200000
Read Article
Request Data:
{}
[ARTICLE] Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

Article

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

1672790400000
Read Article
Request Data:
{}
[ARTICLE] Client Breach Response: The Impact of Capital One’s Legal Battle

Article

Client Breach Response: The Impact of Capital One’s Legal Battle

1594598400000
Read Article
Request Data:
{}
[ARTICLE] BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

Article

BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

1585785600000
Read Article
Request Data:
{}
[ARTICLE] How to Prepare for a Cyber Hurricane: 3 Key Takeaways

Article

How to Prepare for a Cyber Hurricane: 3 Key Takeaways

1652918400000
Read Article
Request Data:
{}
[ARTICLE] Corvus Interview: The State of Cyber with Ian Newman

Article

Corvus Interview: The State of Cyber with Ian Newman

1652227200000
Read Article
Request Data:
{}
[ARTICLE] Cybersecurity Strategies for Small- and Medium-Sized Businesses

Article

Cybersecurity Strategies for Small- and Medium-Sized Businesses

1649808000000
Read Article
Request Data:
{}
[ARTICLE] Prioritize Patching with Risk-Based Vulnerability Management

Article

Prioritize Patching with Risk-Based Vulnerability Management

1630281600000
Read Article
Request Data:
{}
[ARTICLE] Microsoft Exchange: Where We Are Now

Article

Microsoft Exchange: Where We Are Now

1616544000000
Read Article
Request Data:
{}
[ARTICLE] Attack Analysis: The Latest on Kaseya and PrintNightmare

Article

Attack Analysis: The Latest on Kaseya and PrintNightmare

1625788800000
Read Article
Request Data:
{}
[ARTICLE] Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

Article

Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

1620864000000
Read Article
Request Data:
{}
[ARTICLE] Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

Article

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

1637020800000
Read Article
Request Data:
{}
[ARTICLE] Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

Article

Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

1633651200000
Read Article
Request Data:
{}
[ARTICLE] Cyber Insurance Broker Tips: How to Play Offense in a Hard Market

Article

Cyber Insurance Broker Tips: How to Play Offense in a Hard Market

1635465600000
Read Article
Request Data:
{}
[ARTICLE] Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

Article

Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

1613692800000
Read Article
Request Data:
{}
[ARTICLE] Cyber Coverage Explained: PCI Fines and Penalties Coverage

Article

Cyber Coverage Explained: PCI Fines and Penalties Coverage

1661299200000
Read Article
Request Data:
{}
[ARTICLE] Technology: Revolutionizing the Specialty Commercial Insurance Market

Article

Technology: Revolutionizing the Specialty Commercial Insurance Market

1623283200000
Read Article
Request Data:
{}
[ARTICLE] Property Insurance Meets Big Data

Article

Property Insurance Meets Big Data

1609372800000
Read Article
Request Data:
{}
[ARTICLE] Keeping up with Cybercriminals: The Future of Online Threats

Article

Keeping up with Cybercriminals: The Future of Online Threats

1658448000000
Read Article
Request Data:
{}
[ARTICLE] Small Businesses: How to Improve Your Security on a Budget

Article

Small Businesses: How to Improve Your Security on a Budget

1644969600000
Read Article
Request Data:
{}
[CASE STUDY] Palo Alto Networks VPN Vulnerability

Case Study

Palo Alto Networks VPN Vulnerability

1659312000000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Tech E+O® eBrochure

Broker Resource

Smart Tech E+O® eBrochure

1714521600000
Read Article
Request Data:
{}
[ARTICLE] Cyber and Construction: Laying Groundwork to Combat Digital Threats

Article

Cyber and Construction: Laying Groundwork to Combat Digital Threats

1716422400000
Read Article
Request Data:
{}
[ARTICLE] Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

Article

Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

1715904000000
Read Article
Request Data:
{}
[ARTICLE] Q1 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

Article

Q1 '24 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Request Data:
{}
[ARTICLE] Change Healthcare Hack: Everything You Need To Know

Article

Change Healthcare Hack: Everything You Need To Know

1711929600000
Read Article
Request Data:
{}
[Article] Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

Article

Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

1710892800000
Read Article
Request Data:
{}
[ARTICLE] What’s Next in Tech E&O: What Corvus Underwriters Are Seeing

Article

What’s Next in Tech E&O: What Corvus Underwriters Are Seeing

1710201600000
Read Article
Request Data:
{}
[ARTICLE] The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

Article

The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

1707955200000
Read Article
Request Data:
{}
[ARTICLE] Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

Article

Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

1707782400000
Read Article
Request Data:
{}
[ARTICLE] Q4 Ransomware Report: 2023 Ends as a Record-Breaking Year

Article

Q4 '23 Ransomware Report: 2023 Ends as a Record-Breaking Year

1706486400000
Read Article
Request Data:
{}
[ARTICLE] How Inside-out Insights Shape Cyber Risk Assessment

Article

How Inside-out Insights Shape Cyber Risk Assessment

1666915200000
Read Article
Request Data:
{}
[ARTICLE] How US Cyber MGAs Impact Policyholders and the Global Cyber Market

Article

How US Cyber MGAs Impact Policyholders and the Global Cyber Market

1651708800000
Read Article
Request Data:
{}
[REPORT] Corvus Risk Insights Index: Q1 2022 Edition

Report

Corvus Risk Insights Index: Q1 2022 Edition

1648771200000
Read Article
Request Data:
{}
[VIDEO] What are DDoS attacks?

Video

What are DDoS attacks?

1709251200000
Watch Video
Request Data:
{}
[VIDEO] What are Resilient Backup Solutions?

Video

What are Resilient Backup Solutions?

1643673600000
Watch Video
Request Data:
{}
[VIDEO] What is Endpoint Detection and Response?

Video

What is Endpoint Detection and Response?

1643673600000
Watch Video
Request Data:
{}
[REPORT] 2021: Corvus Risk Insights Index

Report

2021: Corvus Risk Insights Index

1633046400000
Read Article
Request Data:
{}
[PDF GUIDE] Incident Response Done Right

Guide

Incident Response Done Right

1633046400000
Download PDF
Request Data:
{}
[PDF GUIDE] About Corvus Black: Risk + Response Services

Guide

About Corvus Black: Risk + Response Services

1627776000000
Download PDF
Request Data:
{}
[WEBINAR] How Brokers Can Win in Cyber Insurance Today

Webinar

How Brokers Can Win in Cyber Insurance Today

1659312000000
Watch Webinar
Request Data:
{}
[PDF DOWNLOAD] Sample Smart Tech E+O® Policy

Broker Resource

Sample Smart Tech E+O® Policy

1651363200000
Read Article
Request Data:
{}
Request Data:
{}
[PDF GUIDE] The Ultimate Guide to a Vendor Data Breach Response

Guide

The Ultimate Guide to a Vendor Data Breach Response

1596240000000
Download PDF
Request Data:
{}
[VIDEO] Cyber Coverage: What is Business Interruption?

Video

Cyber Coverage: What is Business Interruption?

1585699200000
Watch Video
Request Data:
{}
[VIDEO] Cyber Coverage: What are First Party Coverages?

Video

Cyber Coverage: What are First Party Coverages?

1585699200000
Watch Video
Request Data:
{}
[WEBINAR] Privacy Best Practices for Tech Companies

Webinar

Privacy Best Practices for Tech Companies

1633046400000
Watch Webinar
Request Data:
{}
[CASE STUDY] Calls from the Wild: Stories of Risk + Response at Corvus

Case Study

Calls from the Wild: Stories of Risk + Response at Corvus

1633046400000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Working with Risk and Response: Policyholder Experience

Broker Resource

Working with Risk and Response: Policyholder Experience

1656633600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Sample Smart Cyber Insurance® Policy

Broker Resource

Sample Smart Cyber Insurance® Policy

1651363200000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Insurance® eBrochure

Broker Resource

Smart Cyber Insurance® eBrochure

1651363200000
Read Article
Request Data:
{}
[VIDEO] What is Multi-Factor Authentication?

Video

What is Multi-Factor Authentication?

1643673600000
Watch Video
Request Data:
{}
[PDF GUIDE] Guide to Multi-Factor Authentication

Guide

Guide to Multi-Factor Authentication

1617235200000
Download PDF
Request Data:
{}
[WEBINAR] Mitigating Vendor Risk

Webinar

Mitigating Vendor Risk

1617235200000
Watch Webinar
Request Data:
{}
[PDF GUIDE] The Broker's Guide to Ransomware: 2nd Edition

Guide

The Broker's Guide to Ransomware: 2nd Edition

1614556800000
Download PDF
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Made for Construction

Broker Resource

Smart Cyber Made for Construction

1711929600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Made for Healthcare

Broker Resource

Smart Cyber Made for Healthcare

1696118400000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Made for Financial Services

Broker Resource

Smart Cyber Made for Financial Services

1696118400000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Made for Manufacturers

Broker Resource

Smart Cyber Made for Manufacturers

1693526400000
Read Article
Request Data:
{}
[ARTICLE] Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

Article

Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

1718668800000
Read Article
Request Data:
{}
[ARTICLE] What is a Telnet vulnerability?

Article

What is a Telnet vulnerability?

1603843200000
Read Article
Request Data:
{}
[ARTICLE] What is an SMB vulnerability?

Article

What is an SMB vulnerability?

1603843200000
Read Article
Request Data:
{}
[ARTICLE] What is a Bluekeep vulnerability?

Article

What is a Bluekeep vulnerability?

1603670400000
Read Article
Request Data:
{}
[ARTICLE] What is RDP and why is it a security concern?

Article

What is RDP and why is it a security concern?

1670803200000
Read Article
Request Data:
{}
[CASE STUDY] Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

Case Study

Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

1639699200000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] A Guide to Mitigating Infostealer Malware

Article

A Guide to Mitigating Infostealer Malware

1685491200000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] How to Respond to a Cyber Incident

Article

How to Respond to a Cyber Incident

1667347200000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] Q4 2023 Cyber Vulnerability Report and Impact

Article

Q4 2023 Cyber Vulnerability Report and Impact

1704067200000
Read Article
Request Data:
{}
[ARTICLE] Q3 2023 Cyber Vulnerability Report and Impact

Article

Q3 2023 Cyber Vulnerability Report and Impact

1696118400000
Read Article
Request Data:
{}
[ARTICLE] Q2 2023 Cyber Vulnerability Report and Impact

Article

Q2 2023 Cyber Vulnerability Report and Impact

1688169600000
Read Article
Request Data:
{}
[ARTICLE] Q1 2023 Cyber Vulnerability Report and Impact

Article

Q1 2023 Cyber Vulnerability Report and Impact

1711929600000
Read Article
Request Data:
{}
Request Data:
{}
Request Data:
{}
Request Data:
{}
[ARTICLE] GitLab Vulnerability Alert | January 2024

Article

GitLab Vulnerability Alert | January 2024

1705017600000
Read Article
Request Data:
{}
[ARTICLE] Ivanti Connect Secure Vulnerability Alert | January 2024

Article

Ivanti Connect Secure Vulnerability Alert | January 2024

1707350400000
Read Article
Request Data:
{}
[ARTICLE] Jenkins Vulnerability Alert | January 2024

Article

Jenkins Vulnerability Alert | January 2024

1706140800000
Read Article
Request Data:
{}
[ARTICLE] GoAnywhere Vulnerability Alert | January 2024

Article

GoAnywhere Vulnerability Alert | January 2024

1705968000000
Read Article
Request Data:
{}
[ARTICLE] Confluence Data Center Vulnerability Alert | January 2024

Article

Confluence Data Center Vulnerability Alert | January 2024

1705363200000
Read Article
Request Data:
{}
[ARTICLE] ScreenConnect Vulnerability | February 2024

Article

ScreenConnect Vulnerability | February 2024

1709078400000
Read Article
Request Data:
{}
[ARTICLE] Fortinet Fortigate Vulnerability Alert | February 2024

Article

Fortinet Fortigate Vulnerability Alert | February 2024

1708041600000
Read Article
Request Data:
{}
[ARTICLE] Palo Alto GlobalProtect Vulnerability | April 2024

Article

Palo Alto GlobalProtect Vulnerability | April 2024

1713312000000
Read Article
Request Data:
{}
[ARTICLE] CDK Global Incident | June 2024

Article

CDK Global Incident | June 2024

1717372800000
Read Article
Request Data:
{}
[PDF] Q1 '24 Ransomware Report PDF

Report

Q1 '24 Ransomware Report PDF: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Insurance® Appetite Guide

Broker Resource

Smart Cyber Insurance® Appetite Guide

1718668800000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Cyber Insurance® Application

Broker Resource

Smart Cyber Insurance® Application

1714089600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Smart Tech E+O® Application

Broker Resource

Smart Tech E+O® Application

1714089600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Risk Prevention Services eBrochure

Broker Resource

Risk Prevention Services eBrochure

1721865600000
Read Article
Request Data:
{}
[PDF DOWNLOAD] Retention Reduction Endorsement

Broker Resource

Retention Reduction Endorsement

1721865600000
Read Article
Request Data:
{}
Request Data:
{}
[ARTICLE] Record Ransomware Attacks: June 2023 Highest Month Ever

Article

Record Ransomware Attacks: June 2023 Highest Month Ever

1689811200000
Read Article
Request Data:
{}
[ARTICLE] Rising Tide of Ransomware Attacks: Current and Future Trends

Article

Rising Tide of Ransomware Attacks: Current and Future Trends

1687996800000
Read Article
Request Data:
{}
[ARTICLE] Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

Article

Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

1686268800000
Read Article
Request Data:
{}
[ARTICLE] Ransomware Update: April 2023 Takes Spot for Third Highest Month

Article

Ransomware Update: April 2023 Takes Spot for Third Highest Month

1684368000000
Read Article
Request Data:
{}
[ARTICLE] Threat Intel from Corvus Insurance

Article

March 2023 Sees 60% Increase in Ransomware Attacks

1681776000000
Read Article
Request Data:
{}
[ARTICLE] Threat Intel from Corvus Insurance

Article

Global IT Meltdown: CrowdStrike Software Update Causes Broad Outages

1723507200000
Read Article
Request Data:
{}
[ARTICLE] Navigating Third-Party Risk: A Key Component for Business Resilience

Article

Navigating Third-Party Risk: A Key Component for Business Resilience

1721606400000
Read Article
Request Data:
{}
[REPORT] Q2 Cyber Threat Report: Ransomware Season Arrives Early

Article

Q2 '24 Cyber Threat Report: Ransomware Season Arrives Early

1724284800000
Read Article
Request Data:
{}
[PDF] Q2 2024 Cyber Threat Report

Report

Q2 '24 Cyber Threat Report PDF: Ransomware Season Arrives Early

1724284800000
Read Article
Request Data:
{}
[WEBINAR] Q2 Cyber Threat Report: Ransomware Season Arrives Early

Webinar

Q2 '24 Cyber Threat Webinar

1725321600000
Watch Webinar
Request Data:
{}
[PDF] Healthcare Claims Scenarios

Broker Resource

Claims Scenarios for the Healthcare Industry

1727222400000
Read Article
Request Data:
{}
[PDF] Manufacturing Claims Scenarios

Broker Resource

Claims Scenarios for the Manufacturing Industry

1727827200000
Read Article
Request Data:
{}
[PDF] Financial Services Claims Scenarios

Broker Resource

Claims Scenarios for the Financial Services Industry

1727913600000
Read Article
Request Data:
{}
[PDF] Construction Claims Scenarios

Broker Resource

Claims Scenarios for the Construction Industry

1728950400000
Read Article
Request Data:
{}
[WEBINAR] Q1 24' Ransomware Findings

Webinar

Q1 24' Ransomware Findings

1714435200000