Cyber Insurance

Blog
Timely Reporting Can Be the Deciding Factor in Cyber Insurance
The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.

Blog
CrowdStrike Outage: Policyholder Guidance and Insurance Implications
The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.

Blog
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.

Blog
Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance
Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.

Blog
The State of Active Insurance: 2024 Cyber Claims Report
Discover the latest trends in ransomware, funds transfer fraud, risky technology, and the state of Active Insurance in Coalition’s 2024 Cyber Claims Report.

Blog
The Double-Edged Sword of Using Boundary Devices
Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.

Blog
Control Cyber Risk from the Inside Out
Coalition Control™ integrates with cloud providers Microsoft 365, Google Workspace, and AWS to allow customers to manage digital risks in a single platform.

Blog
Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning
Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.

Blog
Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)
During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.

Blog
Global Reflections: Revisiting Coalition’s Growth in 2023
New geographies, new market segments, new products, and even new languages. Here's how we stuck to our mission of protecting the unprotected.

Blog
The Tremendous Opportunity (and Threat) of Artificial Intelligence
When considering the benefits of artificial intelligence, striking the right balance is essential in Coalition's commitment to protecting the unprotected.

Blog
Prioritizing Exposures Gives Clients a Security Advantage
Focusing on the security exposures that are most likely to result in loss allows policyholders to prioritize their time and effort on impactful improvements.Â

Blog
Preserving Data Privacy in a Digital Age
Organizations that fail to prioritize data privacy can put themselves at risk not only of the direct impacts of a cyber attack but also liability to others.

Blog
MOVEit Mayhem: Understanding Threats and Protecting Policyholders
In the six weeks since Progress Software disclosed a critical vulnerability in its file-transfer program, MOVEit has created a perfect storm of cyber risk.








