Get an exclusive first look at Coalition’s new 2026 Cyber Claims Report at our live webinar on March 5.
Skip To Main Content
Cyber Incident? Get Help

Featured resources

Cyber Knowledge Center

Build your cyber expertise, access exclusive insights, read real customer stories, and more.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Home Incident TypesIndustriesProducts & ServicesTopics

Topics

Topics

Incidents & Claims

Security

Blog

The Patchwork Dilemma: Why the Cycle of Reactive Security Must End

Break the cycle of vendor-introduced risk by demanding better tech accountability and transitioning to modern architectures built for cyber resilience.
Joe ToomeyFebruary 11, 2026
Security

Blog

The Incident Responder Wishlist

The experts at Coalition Incident Response (CIR) share their list of strategic shifts that any business can make to enhance its overall security posture.
Gregory AndersenFebruary 06, 2026
Security

Blog

When a 10.0 CVSS Hits: Inside the React2Shell Mobilization

How Coalition mobilized to protect policyholders in response to a potentially massive cyber risk aggregation event in React2Shell.
Tiago HenriquesDecember 11, 2025
Security

Blog

Shades of Gray: The Risk of Doing Business with Hackers

Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?
Jessica StainerNovember 24, 2025
Cyber Insurance

Blog

Debunking 4 Myths Around Wrongful Collection

See what’s real (and what’s not) about web privacy. Our State of Web Privacy report uncovers the reality — backed by nearly 200 claims and analysis of 5,000 websites.
Daniel WoodsNovember 05, 2025

Case Study

Transcription company opts to pay $1M ransom to avoid prolonged business interruption

Transcription company opts to pay $1M ransom to avoid prolonged business interruption

Case Study

Former healthcare contractor steals devices and disrupts operations following termination

Former healthcare contractor steals devices and disrupts operations following termination

Case Study

International nonprofit faces data privacy fallout after widespread software breach

International nonprofit faces data privacy fallout after widespread software breach

Webinar

Coalition Claims Advantage

Coalition Claims Advantage

Webinar

2024 Cyber Claims Report

2024 Cyber Claims Report

Case Study

Ransomware gets real: Bodily injury and property damage

Ransomware gets real: Bodily injury and property damage

Case Study

Colocation and IT firm finds all systems, data, and backups encrypted in ransomware attack

Colocation and IT firm finds all systems, data, and backups encrypted in ransomware attack

Case Study

SaaS company avoids social engineering scheme related to bug bounty program

SaaS company avoids social engineering scheme related to bug bounty program

Case Study

CEO’s business email compromise leads to leak of customer data

CEO’s business email compromise leads to leak of customer data

Case Study

Threat actors collect fraudulent tax refunds after theft from accounting firm

Threat actors collect fraudulent tax refunds after theft from accounting firm

Maximize your

coverage for digital

and technology risks

Protect your business from technology risks with Active Cyber and Tech E&O insurance offered by Coalition.

Tech_E+O_4