Data & Insights

Blog
Allie K. Miller Explains How to Use AI to Shape Your Workday
Discover why Allie K. Miller says the tool phase of AI is over and why high-agency leadership and autonomous teammates are the keys to mastering the AI age.

Blog
‘Bleed’ Trilogy Complete With Newest Memory Leak in Citrix NetScaler
For the third time in as many years, businesses are being urged to patch a “bleed”-style vulnerability in Citrix NetScaler.

Blog
How Geopolitical Tension Can Spotlight Latent Cyber Risks
Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.

Blog
How Infostealers May Have Opened the Door to the Stryker Wipe
Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.

Blog
5 Essential Insights From Our 2026 Cyber Claims Report
Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.

Blog
Risky Tech Ranking: Q4 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q4 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
Bridging the Cyber Insurance Gap Between Brokers and SMEs
Coalition UK research reveals a gap between specialist cyber insurance take-up by SME decision makers and broker impact on outcomes

Blog
Beyond Capacity: How Coalition Re is Building the Future of Cyber Stability
Coalition Re harnesses the full power of Coalition’s cyber intelligence to give reinsurance cedants an unprecedented view across the entire digital ecosystem.

Blog
Risky Tech Ranking: Q3 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
Predicting Real-World Exploitation with Coalition ESS
The Coalition Exploit Scoring System provides predictive insights that enhance vulnerability management without replacing human judgment or threat intelligence.

Blog
Nation-State Breach of F5 Creates Widespread Exposure
Coalition notified policyholders about a newly disclosed breach, which prompted government warnings of an imminent threat to all businesses using F5 technology.

Blog
Two New Cisco ASA Vulnerabilities Actively Exploited in the Wild
Coalition notified policyholders about two critical vulnerabilities in Cisco’s Secure Firewall Adaptive Security Appliance.

Blog
Risky Tech Ranking: Q2 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q2 2025 with updates on the number of vendors scored, contributing vulnerabilities, and more.

Blog
Defense in Depth: Building a Multi-Layered Security Strategy
Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.










