
Blog
Bank Impersonation: The New Frontier of Funds Transfer Fraud
Bank impersonation is on the rise. Discover why these new social engineering scams make it harder to recover stolen funds and how to protect against them.

Blog
5 Ways Wirespeed Can Transform the MSP Business Model
Wirespeed Automated Detection & Response can help managed service providers improve margins, scale more efficiently, and strengthen their security offering.

Blog
Risky Tech Ranking: Q1 2026 Updates
See how Coalition’s Risky Tech Ranking evolved in Q1 2026 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
Security Alert: Critical Authentication Bypass Vulnerability in cPanel
Coalition notified policyholders about a critical vulnerability in cPanel and WebHost Manager that allows remote attackers to bypass authentication.

Blog
Introducing Enhanced Business Recovery
Enhanced Business Recovery is a suite of endorsements designed to protect revenue, speed up settlements, and keep businesses running while claims are processed.

Blog
After Mythos: What Actually Changes for Cyber Risk
Why the sky isn't falling, where the threat surface genuinely expands, and why point-in-time cyber underwriting is running out of road.
Cyber Insurance
See all

Blog
Bank Impersonation: The New Frontier of Funds Transfer Fraud
Bank impersonation is on the rise. Discover why these new social engineering scams make it harder to recover stolen funds and how to protect against them.

Blog
Introducing Enhanced Business Recovery
Enhanced Business Recovery is a suite of endorsements designed to protect revenue, speed up settlements, and keep businesses running while claims are processed.

Blog
After Mythos: What Actually Changes for Cyber Risk
Why the sky isn't falling, where the threat surface genuinely expands, and why point-in-time cyber underwriting is running out of road.
Security
Security

Blog
5 Ways Wirespeed Can Transform the MSP Business Model
Wirespeed Automated Detection & Response can help managed service providers improve margins, scale more efficiently, and strengthen their security offering.

Blog
Risky Tech Ranking: Q1 2026 Updates
See how Coalition’s Risky Tech Ranking evolved in Q1 2026 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.

Blog
Security Alert: Critical Authentication Bypass Vulnerability in cPanel
Coalition notified policyholders about a critical vulnerability in cPanel and WebHost Manager that allows remote attackers to bypass authentication.
Executive Risks
See all

Blog
How Cyber Insurance Can Prevent Attacks from Spiraling into D&O Claims
Cyber insurance helps protect businesses against financial and reputational damages, but its impact on D&O liability makes it a must-have for all executives.

Blog
Combining Crime and Cyber: Common Claims and Core Coverages
Cybercrimes often fall between two types of insurance policies: crime and cyber. Both can coexist in harmony for the benefit of the policyholder.










