<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

Generative AI is here. How does it impact cyber insurance?

Brokers are asking about the impact of generative AI on cyber insurance. Don't ask ChatGPT yet — we have the answers.

Can Cyber Risk Prevention Really Work? Yes, And Here’s How

The threat landscape is overwhelming, but Corvus Risk Prevention Services can help. Discover the benefits of cyber risk prevention in this short blog.

Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

Corvus observed 329 new ransomware victims on leak sites in May 2023, 51% higher than in May 2022. Learn more about emerging ransomware trends.

A Guide to Mitigating Infostealer Malware

Threat actors are increasingly using infostealer malware to infiltrate and exploit digital systems. Here's what you need to know.

Ransomware Update: April 2023 Takes Spot for Third Highest Month

356 new ransomware victims were posted on leak sites in April 2023. This is the third-highest month of recorded ransomware victims in the past two years.

Cyber Coverage Explained: Wrongful Collection of Data

As regulators crack down, wrongful collection of data claims are increasing rapidly. How can brokers and carriers provide the best solutions for clients?

A Guide to Security Controls For Cloud-Based Organizations

What are the best practices for implementing security controls for cloud-based organizations? Find out in this short cybersecurity blog!

March 2023 Sees 60% Increase in Ransomware Attacks

Corvus observed 452 new ransomware victims on leak sites in March 2023. Ransomware is up 60% from this time last year, and 141% from two years ago.

5 High-Impact Cybersecurity Practices for Tech Companies

The threat of ransomware is persisting, and tech companies have unique risks. Here are five high-impact security practices to protect your organization.

A Guide to Securing Access Controls

What are the best practices and resources to help secure access to your organization’s systems? Find out in this short cybersecurity blog.