Control

Blog
New Privacy Risk Insights to Help Navigate Wrongful Collection
As wrongful collection claims rise, Active Privacy Protection provides businesses with visibility to privacy-related exposures.

Blog
How SSO & MFA Work in Tandem to Strengthen Your Cyber Defenses
Single sign-on (SSO) and multi-factor authentication (MFA) are two vital security controls to protect against attackers gaining access to a business network.

Blog
How to Translate Cyber Risk Into Financial Impact
Coalitionâs Financial Risk Calculator translates cyber risks into clear financial impact so you can remove the guesswork and make smarter security decisions.

Blog
Two New Cisco ASA Vulnerabilities Actively Exploited in the Wild
Coalition notified policyholders about two critical vulnerabilities in Ciscoâs Secure Firewall Adaptive Security Appliance.

Blog
The Endpoint Security Tool You May Already Be Paying For
Rather than buying a new security tool to bolster your cybersecurity posture, see if youâre entitled to endpoint security with your Microsoft business license.

Blog
Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks
Coalition notified policyholders about a critical remote code execution vulnerability in Citrixâs NetScaler products that is already being exploited in the wild.

Blog
How Vanishing Retention Rewards Security-Conscious Policyholders
Coalition policyholders can reduce their retention by demonstrating theyâre proactively thinking about cybersecurity. Learn how Vanishing Retention works.

Blog
5 Key Takeaways from Activate 2025
Relive the excitement and announcements from Activate 2025 and see how Active Insurance is driving cyber insurance forward with innovation and expertise.

Blog
Cyber Threat Index 2025: Deciphering the Ransomware Playbook
The Cyber Threat Index 2025 offers insights and data from Coalitionâs insurance claims, scanning engine, global honeypot network, and vulnerability analysis.

Blog
Infostealers Are Silently Siphoning Businessesâ Sensitive Data
Attackers are increasingly using infostealers to loot private data en masse. Businesses can mitigate these risks with support from Coalition Security.

Blog
How MSPs Can Add the Second âSâ with Coalition
Adding the second âsâ â security â and becoming a managed security service provider is possible with the right tools, expertise, and support.

Blog
Security Alert: rsync Vulnerability Allows for Remote Code Execution
Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.

Blog
Introducing Cyber Health Rating
Cyber Health Rating is a comprehensive cyber health metric in Coalition ControlÂŽ that provides actionable steps to improve your cybersecurity posture.

Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalitionâs Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.












