<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Broker resources

Access to resources tailored to cyber insurance brokers such as appetite guides and product information, cybersecurity reports, and emerging cyber insurance trends from Corvus Insurance.

Filter by

Broker thought leadership

 
Article

Cyber is insurable, and it’s a watershed moment for our industry

Getting cyber insurance “right” isn’t just a good business opportunity — it’s also a make-or-break moment for the industry.

Read Article
[ARTICLE] Cyber is insurable, and it’s a watershed moment for our industry
Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Article

Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

1698883200000
Read Article
Article

Cyber Insurance Defined: Traditionally, and Now

1667952000000
Read Article
Article

What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

1675987200000
Read Article
Article

Cyber Coverage Explained: Sub-limits and Coinsurance

1643155200000
Read Article
Article

Cyber and Healthcare: Treating the Rise of Ransomware

1702944000000
Read Article
Article

Generative AI is here. How does it impact cyber insurance?

1687910400000
Read Article
Article

Common Cyber Insurance Myths, Debunked

1655337600000
Read Article
Article

How Healthcare is Responding to New Guidelines for Pixel Tech

1680566400000
Read Article
Article

Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime

1638403200000
Read Article
Article

Cyber Coverage Explained: Wrongful Collection of Data

1683763200000
Read Article
Article

4 Ways Cyber Brokers Are Embracing Digital Transformation

1663545600000
Read Article
Article

Cyber is insurable, and it’s a watershed moment for our industry

1672963200000
Read Article
Article

Corvus Risk Navigator™: How We Supercharge Cyber Underwriters

1675296000000
Read Article
Article

Cyber Coverage Explained: Business Interruption

1583452800000
Read Article
Article

Cyber Coverage Explained: Contingent Business Interruption

1632787200000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part I of II)

1598572800000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part II of II)

1599091200000
Read Article
Article

Historical Data Won’t Predict Cyber Claims - Here’s What Will

1553731200000
Read Article
Article

How to Prepare for a Cyber Hurricane: 3 Key Takeaways

1652918400000
Read Article
Article

Corvus Interview: The State of Cyber with Ian Newman

1652227200000
Read Article
Article

Cyber Insurance Broker Tips: How to Play Offense in a Hard Market

1635465600000
Read Article
Article

Cyber Coverage Explained: PCI Fines and Penalties Coverage

1661299200000
Read Article
Article

Technology: Revolutionizing the Specialty Commercial Insurance Market

1623283200000
Read Article
Article

Property Insurance Meets Big Data

1609372800000
Read Article
Article

Cyber and Construction: Laying Groundwork to Combat Digital Threats

1716422400000
Read Article
Article

Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

1715904000000
Read Article
Article

What’s Next in Tech E&O: What Corvus Underwriters Are Seeing

1710201600000
Read Article
Article

How US Cyber MGAs Impact Policyholders and the Global Cyber Market

1651708800000
Read Article
Webinar

How Brokers Can Win in Cyber Insurance Today

1659312000000
Watch Webinar
Video

Cyber Coverage: What is Business Interruption?

1585699200000
Watch Video
Video

Cyber Coverage: What are First Party Coverages?

1585699200000
Watch Video

Threat Intel

 
Report

Q3 '23 Ransomware Report PDF

1698105600000
Read Article
Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Article

Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

1693353600000
Read Article
Article

Cyber Insurance Defined: Traditionally, and Now

1667952000000
Read Article
Article

What’s Next in Cyber: 3 Trends Cyber Underwriters Are Seeing

1675987200000
Read Article
Article

Cyber Coverage Explained: Sub-limits and Coinsurance

1643155200000
Read Article
Article

3 Ways Threat Actors Will Kick Off the New Year

1702425600000
Read Article
Article

Black Basta Ransomware Has Extracted Over $100 Million From its Victims

1698883200000
Read Article
Article

Another Record-Breaking Month for Ransomware: November Up 110% YoY

1702857600000
Read Article
Article

Cyber and Healthcare: Treating the Rise of Ransomware

1702944000000
Read Article
Article

Key Ransomware Indicator Up 56% Year-on-Year: October Data

1699833600000
Read Article
Article

Decrease in Ransomware at the Start of the Russian Invasion of Ukraine

1647907200000
Read Article
Article

August Ransomware Recap: Sixth Month in a Row with YoY Increase

1694649600000
Read Article
Article

Record Ransomware Attacks: 6-Month Upward Trend Continues in July

1691625600000
Read Article
Article

While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September

1697155200000
Read Article
Article

Corvus Interview: Modern Cyber Warfare with John Hultquist

1661904000000
Read Article
Article

The Ransomware Handbook: Cybercriminals in the News

1664323200000
Read Article
Article

Cyber Threats: 2022 in Review (& What to Expect from 2023)

1671494400000
Read Article
Article

Cyberwarfare in Ukraine: One Year of Observations

1677801600000
Read Article
Article

Q2 '23 Ransomware Report: Global Attacks At All-Time High

1690761600000
Read Article
Article

Modern Warfare & Cyber Risk: Cybercrime, Sanctions Impact & More

1660176000000
Read Article
Report

Corvus Claims Data Infographic - December 2023

1704067200000
Read Article
Report

Corvus Risk Insights Index: Q2 2023 Edition

1682899200000
Read Article
Report

Corvus Risk Insights Index: Q4 2022 Edition

1669852800000
Read Article
Article

Attack Analysis: The Latest on Kaseya and PrintNightmare

1625788800000
Read Article
Case Study

Palo Alto Networks VPN Vulnerability

1659312000000
Download PDF
Article

Q1 '24 Ransomware Report: Ransomware Groups Don’t Die, They Multiply

1714435200000
Read Article
Article

Change Healthcare Hack: Everything You Need To Know

1711929600000
Read Article
Article

Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

1710892800000
Read Article
Article

Q4 '23 Ransomware Report: 2023 Ends as a Record-Breaking Year

1706486400000
Read Article
Report

Corvus Risk Insights Index: Q1 2022 Edition

1648771200000
Read Article
Report

2021: Corvus Risk Insights Index

1633046400000
Read Article
Article

Q4 2023 Cyber Vulnerability Report and Impact

1704067200000
Read Article
Article

Q3 2023 Cyber Vulnerability Report and Impact

1696118400000
Read Article
Article

Q2 2023 Cyber Vulnerability Report and Impact

1688169600000
Read Article
Article

Q1 2023 Cyber Vulnerability Report and Impact

1711929600000
Read Article
Article

GitLab Vulnerability Alert | January 2024

1705017600000
Read Article
Article

Ivanti Connect Secure Vulnerability Alert | January 2024

1707350400000
Read Article
Article

Jenkins Vulnerability Alert | January 2024

1706140800000
Read Article
Article

GoAnywhere Vulnerability Alert | January 2024

1705968000000
Read Article
Article

Confluence Data Center Vulnerability Alert | January 2024

1705363200000
Read Article
Article

ScreenConnect Vulnerability | February 2024

1709078400000
Read Article
Article

Fortinet Fortigate Vulnerability Alert | February 2024

1708041600000
Read Article
Article

Palo Alto GlobalProtect Vulnerability | April 2024

1713312000000
Read Article
Article

CDK Global Incident | June 2024

1717372800000
Read Article
Report

Q1 '24 Ransomware Report PDF

1714435200000
Read Article
Article

Record Ransomware Attacks: June 2023 Highest Month Ever

1689811200000
Read Article
Article

Rising Tide of Ransomware Attacks: Current and Future Trends

1687996800000
Read Article
Article

Ransomware Attacks Remain High: May 2023 Continues Increased YoY Trend

1686268800000
Read Article
Article

Ransomware Update: April 2023 Takes Spot for Third Highest Month

1684368000000
Read Article
Article

March 2023 Sees 60% Increase in Ransomware Attacks

1681776000000
Read Article
Article

Global IT Meltdown: CrowdStrike Software Update Causes Broad Outages

1723507200000
Read Article
Article

Q2 '24 Cyber Threat Report: Ransomware Season Arrives Early

1724284800000
Read Article
Report

Q2 '24 Cyber Threat Report PDF

1724284800000
Read Article
Webinar

Q2 '24 Cyber Threat Webinar

1725321600000
Watch Webinar
Webinar

Q1 24' Ransomware Findings

1714435200000
Watch Webinar
Webinar

Cyber Threats in 2024

1704844800000
Watch Webinar
Article

Q3 Cyber Threat Report: The Ransomware Ecosystem is Increasingly Distributed

1732060800000
Read Article
Report

Q3 '24 Cyber Threat Report PDF

1732060800000
Read Article
Webinar

Analyzing Q3 2024 Ransomware Activity

1732147200000
Watch Webinar

Cybersecurity & risk insights

 
Article

Cyber and Financial Services: Living with a Target on Your Back

1701820800000
Read Article
Article

Cyber and Manufacturing: If You Build It, Threat Actors Will Come

1705622400000
Read Article
Article

Navigating Regulatory Changes: A Look into the NYDFS Cybersecurity Regulation

1698883200000
Read Article
Article

Three Tactics to Combat Next-Gen Social Engineering Schemes

1700006400000
Read Article
Article

Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

1693353600000
Read Article
Article

Generative AI is here. How does it impact cyber insurance?

1687910400000
Read Article
Broker Resource

The Privacy Problem: A Conversation on Pixel Tracking with Experts from BakerHostetler

1674604800000
Read Article
Case Study

A Tale of How Business Email Compromise Attacks Work

1648598400000
Download PDF
Article

Data Science Insight: How VPN Vulnerabilities Affect Ransomware Risk

1662595200000
Read Article
Article

Common Cyber Insurance Myths, Debunked

1655337600000
Read Article
Article

How Healthcare is Responding to New Guidelines for Pixel Tech

1680566400000
Read Article
Article

Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

1634774400000
Read Article
Article

How Our Policyholders Avoid Vulnerability Patching Paralysis

1690761600000
Read Article
Article

Ransomware Groups Want to Exploit Your File Transfer Software

1693440000000
Read Article
Article

Can Cyber Risk Prevention Really Work? Yes, And Here’s How

1687305600000
Read Article
Article

Tracking Pixel Technology: Everything You Need To Know

1670544000000
Read Article
Article

Cyber Insurance Coverage & Terminology Guide

1654560000000
Read Article
Case Study

A Chilling Tale of How Data Exfiltration Attacks Happen

1665532800000
Download PDF
Article

5 High-Impact Cybersecurity Practices for Tech Companies

1694131200000
Read Article
Article

Your Survival Guide to the DDoS Resurgence

1646697600000
Read Article
Article

Mitigating Vendor Risk: Three Steps to Protect Your Organization

1619654400000
Read Article
Article

The ABCs of 3-2-1 Backup Plans

1632873600000
Read Article
Webinar

Cyberattack Prevention Month

1696118400000
Watch Webinar
Webinar

When AI and Insurance Collide

1680307200000
Watch Webinar
Webinar

Pixels and Ad Tech: Learning the Liabilities and Mitigating Risk

1672531200000
Watch Webinar
Article

The 3 Keys to a Successful Cyber Incident Response Strategy

1634256000000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part I of II)

1598572800000
Read Article
Article

How We Use AI to Better Understand Tech E&O Risk (Part II of II)

1599091200000
Read Article
Article

Not-quite-CAT: Exploring Aggregate Cyber Risk in SaaS Providers & VPNs

1672790400000
Read Article
Article

Client Breach Response: The Impact of Capital One’s Legal Battle

1594598400000
Read Article
Article

BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

1585785600000
Read Article
Article

Cybersecurity Strategies for Small- and Medium-Sized Businesses

1649808000000
Read Article
Article

Prioritize Patching with Risk-Based Vulnerability Management

1630281600000
Read Article
Article

Microsoft Exchange: Where We Are Now

1616544000000
Read Article
Article

Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

1620864000000
Read Article
Article

Tech Companies: Beyond Cyber Risk, the Cost of Downstream Impact

1637020800000
Read Article
Article

Graph Your Dependencies: Facebook Outage Proves 'Simple' Doesn’t Work

1633651200000
Read Article
Article

Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

1613692800000
Read Article
Article

Keeping up with Cybercriminals: The Future of Online Threats

1658448000000
Read Article
Article

Small Businesses: How to Improve Your Security on a Budget

1644969600000
Read Article
Article

Cyber and Construction: Laying Groundwork to Combat Digital Threats

1716422400000
Read Article
Article

Cyber Insurance for Small Businesses: BOP vs. Standalone Cyber

1715904000000
Read Article
Article

The Crucial First 48 Hours: Navigating Business Continuity and Disaster Recovery

1707955200000
Read Article
Article

Keep It Real: Avoid Falling for the Rise of Deepfake Phishing Scams

1707782400000
Read Article
Article

How Inside-out Insights Shape Cyber Risk Assessment

1666915200000
Read Article
Video

What are DDoS attacks?

1709251200000
Watch Video
Video

What are Resilient Backup Solutions?

1643673600000
Watch Video
Video

What is Endpoint Detection and Response?

1643673600000
Watch Video
Guide

Incident Response Done Right

1633046400000
Download PDF
Guide

Working with Your Cyber Insurer: Incident Response

1633046400000
Download PDF
Guide

The Ultimate Guide to a Vendor Data Breach Response

1596240000000
Download PDF
Webinar

Privacy Best Practices for Tech Companies

1633046400000
Watch Webinar
Case Study

Calls from the Wild: Stories of Risk + Response at Corvus

1633046400000
Download PDF
Video

What is Multi-Factor Authentication?

1643673600000
Watch Video
Guide

Guide to Multi-Factor Authentication

1617235200000
Download PDF
Webinar

Mitigating Vendor Risk

1617235200000
Watch Webinar
Article

Handling Cyber Objections: 'Cyber Insurance Is Too Expensive'

1718668800000
Read Article
Article

What is a Telnet vulnerability?

1603843200000
Read Article
Article

What is an SMB vulnerability?

1603843200000
Read Article
Article

What is a Bluekeep vulnerability?

1603670400000
Read Article
Article

What is RDP and why is it a security concern?

1670803200000
Read Article
Case Study

Case Study: Unpatched Microsoft Exchange Server Vulnerabilities

1639699200000
Download PDF
Article

A Guide to Multi-factor Authentication (MFA)

1713744000000
Read Article
Article

A Guide to Vulnerability Management

1614211200000
Read Article
Article

A Guide to Zero Trust Network Access (ZTNA)

1668556800000
Read Article
Article

How to Take Email Security to the Next Level

1681257600000
Read Article
Article

A Guide to Mitigating Infostealer Malware

1685491200000
Read Article
Article

HTTP Security Headers Best Practices

1636675200000
Read Article
Article

A Guide to Internal Governance, Risk, and Compliance

1614211200000
Read Article
Article

A Guide to Threat Detection

1679443200000
Read Article
Article

How to Respond to a Cyber Incident

1667347200000
Read Article
Article

A Guide to Securing Access Controls

1681257600000
Read Article
Article

A Guide To Securing Email at Your Organization

1667347200000
Read Article
Article

A Guide to MFA Bypass Attacks

1701302400000
Read Article
Article

A Guide to Data Encryption

1679443200000
Read Article
Article

A Guide to Funds Transfer Fraud

1655769600000
Read Article
Article

Best Practices for Securing Vendors

1614211200000
Read Article
Article

A Guide to Security Controls For Cloud-Based Organizations

1681862400000
Read Article
Article

A Guide to Common Vulnerabilities and Exposures (CVEs)

1664323200000
Read Article
Article

A Guide to Endpoint Detection Response (EDR)

1668643200000
Read Article
Article

Navigating Third-Party Risk: A Key Component for Business Resilience

1721606400000
Read Article
[DIAGRAM] CrowBar & PH Dashboard Information from Corvus

CrowBar & PH Dashboard Information

Get step-by-step instructions, and helpful information about our platforms, products, and services

Explore The Knowledge Nest
 

 

Your partner in the business of risk

Grow your business with cyber insurance solutions backed by expert guidance, industry-leading intelligence, and intuitive risk management tools.

Log in to Policyholder Platform

[DIAGRAM] Corvus Broker Platform Login