🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Cyber Incident? Get Help
Topics

Risk Mitigation

Security

Blog

Defenders Need Superior Software and Algorithms to Win in 2026

With AI-accelerated cyber attackers, security decisions now need to be made in seconds, not minutes. How can defenders keep up?
Tim MalcomVetterDecember 22, 2025
Security

Blog

When a 10.0 CVSS Hits: Inside the React2Shell Mobilization

How Coalition mobilized to protect policyholders in response to a potentially massive cyber risk aggregation event in React2Shell.
Tiago HenriquesDecember 11, 2025
Security

Blog

Patch Immediately: Critical Vulnerability Dubbed 'React2Shell'

Coalition notified policyholders about a new critical vulnerability impacting React and Next.js applications that allows RCE without authentication.
Joe ToomeyDecember 05, 2025
Cyber Insurance

Blog

Beyond Capacity: How Coalition Re is Building the Future of Cyber Stability

Coalition Re harnesses the full power of Coalition’s cyber intelligence to give reinsurance cedants an unprecedented view across the entire digital ecosystem.
Diana LiuNovember 26, 2025
Cyber Insurance

Blog

New Privacy Risk Insights to Help Navigate Wrongful Collection

As wrongful collection claims rise, Active Privacy Protection provides businesses with visibility to privacy-related exposures.
Daniel WoodsNovember 12, 2025
Security

Blog

Risky Tech Ranking: Q3 2025 Updates

See how Coalition’s Risky Tech Ranking evolved in Q3 2025 with updates on the number of vendors scored, contributing vulnerabilities, Vendor Scores, and more.
Lucio Fernandez-ArjonaNovember 07, 2025

Webinar

Cyber Loss Control: Advise With Confidence

Cyber Loss Control: Advise With Confidence

Webinar

Getting Started with Coalition Active Insurance

Getting Started with Coalition Active Insurance

Article

PCI DSS Compliance: A Guide

PCI DSS Compliance: A Guide

Article

What is Ransomware Insurance?

What is Ransomware Insurance?

Article

Malware-based attacks (Ransomware, Trojans, etc.)

Malware-based attacks (Ransomware, Trojans, etc.)

Article

7 Secure Remote Access Best Practices for Small Businesses

7 Secure Remote Access Best Practices for Small Businesses

Article

5 Ways Your Clients Can Benefit from a Cyber Risk Assessment

5 Ways Your Clients Can Benefit from a Cyber Risk Assessment

Article

Authenticating Email Using SPF, DKIM & DMARC

Authenticating Email Using SPF, DKIM & DMARC

Article

What is Email Phishing?

What is Email Phishing?

Maximize your

coverage for digital

and technology risks

Protect your business from technology risks with Active Cyber and Tech E&O insurance offered by Coalition.

Tech_E+O_4