[Live Demo] See how Wirespeed MDR delivers lightning-fast, automated security.
Skip To Main Content
Cyber Incident? Get Help

Featured resources

Cyber Knowledge Center

Build your cyber expertise, access exclusive insights, read real customer stories, and more.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Home Incident TypesIndustriesProducts & ServicesTopics

Products & Services

Products & Services

Coalition Incident Response

Security

Blog

The Incident Responder Wishlist

The experts at Coalition Incident Response (CIR) share their list of strategic shifts that any business can make to enhance its overall security posture.
Gregory AndersenFebruary 06, 2026
Security

Blog

AI Agents Are Amplifying Hard-to-Detect Attacks

Living off the land attacks are getting even harder to combat as attackers turn to AI to move faster and avoid detection.
Shelley MaJanuary 15, 2026
Security

Blog

Shades of Gray: The Risk of Doing Business with Hackers

Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?
Jessica StainerNovember 24, 2025

Webinar

Coalition Security Advantage

Coalition Security Advantage
Security

Blog

How Threat Actors Are Outsmarting Your Email Defenses

Coalition Incident Response has seen an uptick in phishing attacks via Microsoft 365’s Direct Send feature. How does that work?
Joshua SmithOctober 01, 2025
Cyber Insurance

Blog

How Hackers Leverage Insurance Details in Ransomware Attacks

Businesses should secure their cyber insurance policies like any other highly sensitive document to prevent it from becoming a negotiation playbook.
Gregory AndersenAugust 28, 2025
Security

Blog

Defense in Depth: Building a Multi-Layered Security Strategy

Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.
Alok OjhaAugust 27, 2025
Security

Blog

Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks

Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?
Devin CanavanAugust 06, 2025
Security

Blog

Infostealers Are Silently Siphoning Businesses’ Sensitive Data

Attackers are increasingly using infostealers to loot private data en masse. Businesses can mitigate these risks with support from Coalition Security.
Kaly ConnollyMarch 05, 2025
Security

Blog

Threat Actors Are Impersonating IT Teams to Deploy Ransomware

Coalition Incident Response has noted a trend where cybercriminals impersonate the help desk through Microsoft Teams to gain remote access and execute ransomware.
Ramya RagavanFebruary 19, 2025

Case Study

Municipality exercises caution after EDR alerts on suspicious network activity

Municipality exercises caution after EDR alerts on suspicious network activity

Case Study

Nonprofit reports cryptojacking event after noticing higher utility bills

Nonprofit reports cryptojacking event after noticing higher utility bills

Case Study

Labor union recovers $5.5M from international bank account from fraudulent wire transfer

Labor union recovers $5.5M from international bank account from fraudulent wire transfer

Case Study

Threat actor poses as new client and convinces law firm to wire $89,000 in debt collection scheme

Threat actor poses as new client and convinces law firm to wire $89,000 in debt collection scheme

Case Study

Manufacturer gains decryption keys from incident responders and avoids paying sizable ransom

Manufacturer gains decryption keys from incident responders and avoids paying sizable ransom

Maximize your

coverage for digital

and technology risks

Protect your business from technology risks with Active Cyber and Tech E&O insurance offered by Coalition.

Tech_E+O_4