[Live Webinar] Join us 25 March for more insights from our new 2026 Cyber Claims Report.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Policyholder Education

Cyber Insurance

Blog

How Hackers Leverage Insurance Details in Ransomware Attacks

Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.
Gregory AndersenAugust 28, 2025
Security

Blog

Defense in Depth: Building a Multi-Layered Security Strategy

Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.
Alok OjhaAugust 27, 2025
Cyber Insurance

Blog

Taking Responsibility in the Age of Non-Stop CVEs

Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.
Gregory AndersenJuly 31, 2025
Cyber Insurance

Blog

Coalition’s Response to the UK’s Ransomware Consultation: An Opportunity to Prioritise Resilience and Recovery

Coalition contributed a formal response to the UK Home Office's public ransomware consultation and is sharing its views publicly to promote transparency and facilitate a conversation on this important issue.
Sezaneh SeymourMay 08, 2025
Security

Blog

Why Every SMB Should Shrink Its Attack Surface

Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.
Alok OjhaMay 01, 2025
Security

Blog

Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors

Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.
Ramya RagavanApril 22, 2025
Security

Blog

Infostealers Are Silently Siphoning Businesses’ Sensitive Data

Attackers are increasingly using infostealers to loot private data en masse. Businesses can mitigate these risks with support from Coalition Security.
Kaly ConnollyMarch 05, 2025
Security

Blog

How MDR Helps Businesses Protect Against Top Cyber Threats

Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.
Cory MarchandFebruary 27, 2025
Cyber Insurance

Blog

Introducing Cyber Health Rating

Cyber Health Rating is a comprehensive cyber health metric in Coalition Control® that provides actionable steps to improve your cybersecurity posture.
Alok OjhaDecember 16, 2024
Cyber Insurance

Blog

The Unrealized Vision of Cyber Warranties

Businesses may mistakenly think that cyber warranties offer the same benefits as cyber insurance policies, but the two are not the same.
Gregory AndersenSeptember 26, 2024
Cyber Insurance

Blog

CrowdStrike Outage: Policyholder Guidance and Insurance Implications

The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.
Joshua MottaJuly 25, 2024
Security

Blog

CrowdStrike Software Update Triggers Global Outage

A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.
Tiago HenriquesJuly 19, 2024
Security

Blog

Palo Alto Networks: Patch Available for PAN-OS Zero-day

A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
Simon BellApril 15, 2024
Cyber Insurance

Blog

Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning

Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.
Sezaneh SeymourApril 08, 2024
Security

Blog

MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion

Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.
Joe ToomeyMarch 01, 2024