<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

A Guide to Funds Transfer Fraud

Learn about securing funds transfers, out-of-band authentication, and how to avoid becoming the next victim of funds transfer fraud in this cyber blog.

Common Cyber Insurance Myths, Debunked

When cybersecurity (tech-oriented) and insurance (complicated) meet, there are bound to be some misconceptions. Let us help clear the air.

Cyber Insurance Coverage & Terminology Guide

Expand your knowledge of cybersecurity best practices, threat actors, and data breaches to better understand cyber insurance policy terminology.

How to Prepare for a Cyber Hurricane: 3 Key Takeaways

Insurers are looking to get ahead of the first cyber hurricane, but how do you prepare for something unknown? Read our 3 key takeaways from our webinar.

Corvus Interview: The State of Cyber with Ian Newman

We sat down with Ian Newman to get more of his thoughts on innovation in cyber, managing aggregations of risk, and more.

How US Cyber MGAs Impact Policyholders and the Global Cyber Market

Tech-forward Cyber MGAs are setting their sights across the pond. Should the U.K. market extend an open invitation to these relatively new players?

Cybersecurity Strategies for Small- and Medium-Sized Businesses

For too long, misconceptions about cyber risk have prevented serious mitigation efforts by SMBs. How are they catching up?

A Tale of How Business Email Compromise Attacks Work

Through the (frightening) tale of Craig in finance and his company, we'll discover what to expect from a business email compromise attack.

Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

Corvus observed a 30% reduction in ransomware claims frequency from Q4 2021 to Q1 2022. What does the Russian invasion of Ukraine have to do with it?

Your Survival Guide to the DDoS Resurgence

DDoS is back in the news. What is it about these attacks that make them a popular choice among threat actors, and how do we fight it?