
Blog
Boundary Devices and Plugins Prompt Timely Remediation
Explore Coalition’s Zero-Day Alerts by the numbers to learn which technologies drive high-risk vulnerabilities, how we operate as an early-warning system, and when we decide to alert.

Blog
Active Insurance is Built to Dominate the AI Risk Landscape
While much of the insurance industry treats AI as a terrifying, unquantifiable specter, Coalition policies have always been designed to respond to AI risks.

Blog
How Geopolitical Tension Can Spotlight Latent Cyber Risks
Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.

Blog
How Infostealers May Have Opened the Door to the Stryker Wipe
Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.

Blog
Security Alert: Critical Data Exposure in Salesforce Experience Cloud
Coalition has notified policyholders about a widespread campaign targeting misconfigured guest user permissions in Salesforce Experience Cloud sites.

Blog
How Wirespeed Eliminates Guesswork in Detecting Attack Simulations
Wirespeed’s SafeBreach integration enables the positive identification of breach and attack simulations without any additional alert noise.
Cyber Insurance
See all

Blog
Active Insurance is Built to Dominate the AI Risk Landscape
While much of the insurance industry treats AI as a terrifying, unquantifiable specter, Coalition policies have always been designed to respond to AI risks.

Blog
5 Essential Insights From Our 2026 Cyber Claims Report
Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.

Blog
Introducing Coalition for Private Equity
Move beyond transactional placements and empower your PE sponsor clients with a strategic framework to protect their portfolio value with Coalition for Private Equity.
Security
Security

Blog
Boundary Devices and Plugins Prompt Timely Remediation
Explore Coalition’s Zero-Day Alerts by the numbers to learn which technologies drive high-risk vulnerabilities, how we operate as an early-warning system, and when we decide to alert.

Blog
How Geopolitical Tension Can Spotlight Latent Cyber Risks
Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.

Blog
How Infostealers May Have Opened the Door to the Stryker Wipe
Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.
Executive Risks
See all

Blog
How Cyber Insurance Can Prevent Attacks from Spiraling into D&O Claims
Cyber insurance helps protect businesses against financial and reputational damages, but its impact on D&O liability makes it a must-have for all executives.

Blog
Combining Crime and Cyber: Common Claims and Core Coverages
Cybercrimes often fall between two types of insurance policies: crime and cyber. Both can coexist in harmony for the benefit of the policyholder.







