Cyber Threats

Blog
The Patchwork Dilemma: Why the Cycle of Reactive Security Must End
Break the cycle of vendor-introduced risk by demanding better tech accountability and transitioning to modern architectures built for cyber resilience.

Blog
AI Agents Are Amplifying Hard-to-Detect Attacks
Living off the land attacks are getting even harder to combat as attackers turn to AI to move faster and avoid detection.

Blog
Why We Acquired Wirespeed
How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.

Blog
How SSO & MFA Work in Tandem to Strengthen Your Cyber Defenses
Single sign-on (SSO) and multi-factor authentication (MFA) are two vital security controls to protect against attackers gaining access to a business network.

Blog
It’s Time to Say Goodbye to On-Premises Microsoft Exchange
Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.

Blog
How to Translate Cyber Risk Into Financial Impact
Coalition’s Financial Risk Calculator translates cyber risks into clear financial impact so you can remove the guesswork and make smarter security decisions.

Blog
Two New Cisco ASA Vulnerabilities Actively Exploited in the Wild
Coalition notified policyholders about two critical vulnerabilities in Cisco’s Secure Firewall Adaptive Security Appliance.

Blog
The Endpoint Security Tool You May Already Be Paying For
Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.

Blog
Defense in Depth: Building a Multi-Layered Security Strategy
Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.

Blog
Deepfakes Are Making Cyber Scams More Difficult to Detect
While deepfakes introduce a need for increased scrutiny, businesses can combat the rise of AI-enhanced technology with always-on security awareness.

Blog
Australia’s Ransomware Reporting Laws to Clarify True Costs and Impact
New ransomware reporting rules in Australia could set a precedent for how transparency and shared responsibility are prioritised across the cyber ecosystem.

Blog
Taking Responsibility in the Age of Non-Stop CVEs
Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.

Blog
Scattered Spider: Hacker Collective Ensnaring Industry-Specific Targets
The Scattered Spider threat actor group is known for systematically targeting IT help desks and vendors at large organizations within specific industries.

Blog
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.











