94/100
overall score
Total issues found:
426Updated on: December 29, 2025
Data we analyse
Phishing and malware
313
issues
Network security
1
issue
Email security
0
issues
Website security
112
issues
Recent critical risk issues we found
112 SSL configuration issues found
5 corporate credentials stolen
Only 41% of systems CDN-protected
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
91
vs.
50
Network security
100
vs.
89
Email security
100
vs.
52
Website security
70
vs.
68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Company overview
Section 1: Company OverviewCorvus Insurance is a specialist commercial insurer focused on cyber and technology-related risks. Founded to bring data-driven underwriting and proactive risk mitigation to the cyber insurance market, Corvus leverages telemetry, threat intelligence, and predictive analytics to price policies and offer risk-reducing services to policyholders. As a company handling sensitive client information—including underwriting data, incident histories, and business-critical telemetry—Corvus operates at the intersection of insurance and cybersecurity, subjecting it to both financial-regulatory scrutiny and heightened expectations around data protection and operational resilience.
Section 2: Historical Data Breaches
Public records and industry reporting through June 2024 do not identify any widely publicized, material data breaches attributable to Corvus Insurance that exposed large volumes of customer personal data or underwriting records. That absence of reported incidents is a positive signal, but it should not be interpreted as proof of immunity. Firms in Corvus’s market collect and store sensitive datasets (customer financials, incident response details, network telemetry) which, if compromised, would carry outsized financial and reputational impact. Therefore, historical silence increases the obligation for demonstrable, ongoing security controls, transparency about audits and attestations, and prompt disclosure practices in the event of future incidents.
Section 3: Recent Security Breach
[Omitted — no recent breach information provided.]
Section 4: Evaluation of Digital Security
Strengths
- Domain expertise: Corvus’s business model couples underwriting with active cyber risk management, incentivizing investment in monitoring, threat intelligence integration, and customer-facing security services. This operational focus often drives maturity in defensive tooling and security culture.
- Data-centric controls: Given the sensitivity of underwriting and claims data, mature access controls, encryption-in-transit and at-rest, and role-based data minimization are standard expectations for an insurer operating in this space.
Risks and Weaknesses
- Aggregation risk: Corvus aggregates high-value data from numerous customers. A successful compromise could produce broad downstream effects—exposing customer vulnerabilities and claim patterns—raising both financial and systemic risk.
- Third-party and supply-chain exposure: Corvus relies on cloud providers, data processors, and telemetry partners. Inadequate vendor security posture, weak contractual protections, or insufficient supply-chain monitoring would materially increase breach likelihood.
- Insider threats and privileged access: As with any insurer, privileged administrative accounts and underwriting staff access to sensitive files create risk if authentication and session monitoring are insufficient. Corvus should prioritize least-privilege, just-in-time access, and strong privilege auditing.
- Model and data integrity: Corvus’s predictive models and telemetry are valuable intellectual property. Risks include model theft, tampering, or data poisoning, which could undermine underwriting accuracy and create financial exposure.
- Regulatory and privacy compliance: Operating across jurisdictions subjects Corvus to data protection laws (e.g., GDPR, state privacy laws). Noncompliance with data-handling or breach-notification obligations would compound fallout from any incident.
Recommended Controls and Maturity Measures
- Independent attestations: Maintain and publish up-to-date SOC 2 Type II and, where applicable, ISO 27001 certifications; commission regular third-party penetration tests and red-team exercises with transparent remediation timelines.
- Strong identity and access management (IAM): Enforce MFA for all privileged accounts, implement short-lived credentials, and continuous anomaly detection for administrative activity.
- Data protection hygiene: Apply encryption at rest/in transit, robust key management, strict data retention policies, and data minimization across underwriting and claims workflows.
- Supply-chain risk management: Implement continuous vendor risk assessments, contractual security SLAs, and segmentation to limit lateral movement from partner compromise.
- Telemetry and model protection: Employ data integrity checks, model versioning and signing, and secure enclaves for sensitive model training data.
- Incident readiness: Maintain and test an incident response plan that includes legal, regulatory, and client-communication playbooks; carry tailored cyber insurance terms and breach-coaching services for clients to reduce systemic impact.
- Employee training and phishing resilience: Regular, role-based security training, targeted phishing simulations, and measurable remediation programs to reduce human-factor incidents.
Conclusion: Is Corvus Insurance Safe?
Corvus presents a strong strategic alignment between cybersecurity and insurance underwriting, which supports a robust baseline of controls; however, its role as an aggregator of sensitive telemetry and client data creates concentrated risk. Absent public breach history, the company should nonetheless pursue rigorous third-party attestations, strict IAM and vendor controls, and proactive model/data protections to mitigate systemic exposure. Immediate priorities: confirm and publish independent security certifications, harden privileged access, and formalize supply-chain monitoring to reduce financial, reputational, and privacy fallout potential.
Details
Website:
Industries:
Artificial Intelligence
Company size:
201-500 employees
Founded:
2017
Headquarters:
100 Summer Street; Suite 1175; Boston, Massachusetts 02110, US
Outcome reliability
We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.