🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Cyber Threats

Security

Blog

The Patchwork Dilemma: Why the Cycle of Reactive Security Must End

Break the cycle of vendor-introduced risk by demanding better tech accountability and transitioning to modern architectures built for cyber resilience.
Joe ToomeyFebruary 11, 2026
Security

Blog

AI Agents Are Amplifying Hard-to-Detect Attacks

Living off the land attacks are getting even harder to combat as attackers turn to AI to move faster and avoid detection.
Shelley MaJanuary 15, 2026
Security

Blog

Why We Acquired Wirespeed

How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.
Sisi LiuNovember 06, 2025
Security

Blog

How SSO & MFA Work in Tandem to Strengthen Your Cyber Defenses

Single sign-on (SSO) and multi-factor authentication (MFA) are two vital security controls to protect against attackers gaining access to a business network.
Meet PatelOctober 08, 2025
Security

Blog

It’s Time to Say Goodbye to On-Premises Microsoft Exchange

Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.
Gregory AndersenOctober 07, 2025
Security

Blog

How to Translate Cyber Risk Into Financial Impact

Coalition’s Financial Risk Calculator translates cyber risks into clear financial impact so you can remove the guesswork and make smarter security decisions.
Shubham LalwaniSeptember 29, 2025
Security

Blog

Two New Cisco ASA Vulnerabilities Actively Exploited in the Wild

Coalition notified policyholders about two critical vulnerabilities in Cisco’s Secure Firewall Adaptive Security Appliance.
Ryan ChadwickSeptember 29, 2025
Security

Blog

The Endpoint Security Tool You May Already Be Paying For

Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.
Taylor BryantSeptember 05, 2025
Security

Blog

Defense in Depth: Building a Multi-Layered Security Strategy

Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.
Alok OjhaAugust 27, 2025
Security

Blog

Deepfakes Are Making Cyber Scams More Difficult to Detect

While deepfakes introduce a need for increased scrutiny, businesses can combat the rise of AI-enhanced technology with always-on security awareness.
Alok OjhaAugust 13, 2025
Cyber Insurance

Blog

Australia’s Ransomware Reporting Laws to Clarify True Costs and Impact

New ransomware reporting rules in Australia could set a precedent for how transparency and shared responsibility are prioritised across the cyber ecosystem.
Sezaneh SeymourAugust 01, 2025
Cyber Insurance

Blog

Taking Responsibility in the Age of Non-Stop CVEs

Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.
Gregory AndersenJuly 31, 2025
Security

Blog

Scattered Spider: Hacker Collective Ensnaring Industry-Specific Targets

The Scattered Spider threat actor group is known for systematically targeting IT help desks and vendors at large organizations within specific industries.
Tiago HenriquesJuly 07, 2025
Security

Blog

Not All Endpoint Security Solutions Are Created Equal

As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
Jason VitaleJune 28, 2025
Security

Blog

Study Finds Small Businesses Underestimate Cyber Risk Reality

Coalition’s new Small Business Cybersecurity Study uncovers small business leaders’ experiences with and perceptions of cyber risk.
Joe ToomeyJune 25, 2025