
Blog
The Endpoint Security Tool You May Already Be Paying For
Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.

Blog
Risky Tech Ranking: Q2 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q2 2025 with updates on the number of vendors scored, contributing vulnerabilities, and more.

Blog
How Hackers Leverage Insurance Details in Ransomware Attacks
Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.

Blog
Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks
Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.

Blog
Why Coalition is Bringing Active Cyber Insurance to France
We’re bringing Active Insurance to France to support local brokers and businesses with active monitoring, data-driven insights, and actionable guidance to reduce cyber risk.

Blog
Defense in Depth: Building a Multi-Layered Security Strategy
Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.
Cyber Insurance
See all

Blog
How Hackers Leverage Insurance Details in Ransomware Attacks
Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.

Blog
Why Coalition is Bringing Active Cyber Insurance to France
We’re bringing Active Insurance to France to support local brokers and businesses with active monitoring, data-driven insights, and actionable guidance to reduce cyber risk.

Blog
Timely Reporting Can Be the Deciding Factor in Cyber Insurance
The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.
Security
Security

Blog
The Endpoint Security Tool You May Already Be Paying For
Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.

Blog
Risky Tech Ranking: Q2 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q2 2025 with updates on the number of vendors scored, contributing vulnerabilities, and more.
