🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Cyber Incident? Get Help
Topic

Incident Response

Security

Blog

Why We Acquired Wirespeed

How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.
Sisi LiuNovember 06, 2025
Cyber Insurance

Blog

Timely Reporting Can Be the Deciding Factor in Cyber Insurance

The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.
Robert JonesAugust 25, 2025
Cyber Insurance

Blog

UK Government Issues Response to Public Ransomware Consultation

Coalition shares its perspective after the UK government published its official response to the public consultation on ransomware legislation.
Sezaneh SeymourJuly 28, 2025
Security

Blog

Not All Endpoint Security Solutions Are Created Equal

As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
Jason VitaleJune 28, 2025
Security

Blog

6 Cost-Related Questions Every Business Should Ask About Cyber Risk

Get answers on security budgeting, average cyber attack costs, and which solutions deliver the best ROI with the Coalition Security Cost Savings Calculator.
John B. RobertsMay 28, 2025
Security

Blog

Why the Best Security Partner for SMBs Might Be a Cyber Insurance Provider

Small and midsize businesses need a security partner who's invested in their well-being — so why not a cyber insurance provider?
John B. RobertsJanuary 22, 2025
Security

Blog

The Mission of a Strategic Cyber Pro

A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.
Jamie McGrorySeptember 20, 2024
Security

Blog

How MDR Elevates the Role of In-house Security and IT Teams

A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.
Jamie McGrorySeptember 10, 2024
Security

Blog

Cybersecurity Burnout Is Crushing Your Effectiveness

When security professionals are drowning in alerts or not getting them at all, the truly harmful cyber threats can slip through the cracks.
Joe ToomeyAugust 26, 2024
Cyber Insurance

Blog

Familiar Threat Actor Attack Tactics Find New Life

Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.
Gregory AndersenJune 27, 2024
Security

Blog

SEO Poisoning Attacks Demand More Scrutiny from Search Engine Users

Threat actors are capitalizing on the trust we put in search engines by hiding malicious websites in plain sight using a tactic known as SEO poisoning.
Alexander AmmonsJune 20, 2024
Security

Blog

Threat Actor Claims 100% Success With SIM-Swapping Extortion

SIM-swapping extortion attacks are on the rise due to self-service password resets, which help threat actors bypass interaction with their victims.
Shelley MaJune 17, 2024
Cyber Insurance

Blog

Lifting the Lid on Cybercrime: Funds Transfer Fraud

Mark Bird talks UK cybercrime, how the landscape has changed, where Funds Transfer Fraud attacks originate and how to protect against them.
Mark BirdMay 02, 2024
Cyber Insurance

Blog

The Double-Edged Sword of Using Boundary Devices

Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
Gregory AndersenApril 18, 2024
Cyber Insurance

Blog

Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning

Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.
Sezaneh SeymourApril 08, 2024