Ransomware demands surged 47% last year. See how businesses fought back.
Skip To Main Content
Cyber Incident? Get Help

Featured resources

Cyber Knowledge Center

Build your cyber expertise, access exclusive insights, read real customer stories, and more.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Knowledge Center Tile > [Report, Blog, Page, (Security Labs Only)]

PAGE

Future of Cyber Insurance

Get a look at what's next in cyber risk — and what you can do about all of it today.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Cyber Insurance Buyer's Guide

Know what to look for when selecting a cyber policy.

Knowledge Center Tile > [Video, Webinar]

GUIDE

Coalition MDR Buyer's
Guide

Make sure you're asking the right questions when evaluating managed detection and response.

Home Incident TypesIndustriesProducts & ServicesTopics

Topics

Topics

Security Controls

Security

Blog

Boundary Devices and Plugins Prompt Timely Remediation

Explore Coalition’s Zero-Day Alerts by the numbers to learn which technologies drive high-risk vulnerabilities, how we operate as an early-warning system, and when we decide to alert.
Scott WalshMarch 19, 2026

Article

What is Email Phishing?

What is Email Phishing?

Article

Malware-based attacks (Ransomware, Trojans, etc.)

Malware-based attacks (Ransomware, Trojans, etc.)
Security

Blog

How Geopolitical
Tension Can Spotlight
Latent Cyber Risks

Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.
Scott WalshMarch 13, 2026
Security

Blog

How Infostealers May Have Opened the Door to the Stryker Wipe

Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.
Joe ToomeyMarch 12, 2026
Cyber Insurance

Blog

5 Essential Insights From Our 2026 Cyber Claims Report

Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.
Robert JonesMarch 05, 2026
Security

Blog

The Patchwork Dilemma: Why the Cycle of Reactive Security Must End

Break the cycle of vendor-introduced risk by demanding better tech accountability and transitioning to modern architectures built for cyber resilience.
Joe ToomeyFebruary 11, 2026
Security

Blog

The Incident Responder Wishlist

The experts at Coalition Incident Response (CIR) share their list of strategic shifts that any business can make to enhance its overall security posture.
Gregory AndersenFebruary 06, 2026
Security

Blog

AI Agents Are Amplifying Hard-to-Detect Attacks

Living off the land attacks are getting even harder to combat as attackers turn to AI to move faster and avoid detection.
Shelley MaJanuary 15, 2026
Security

Blog

Shades of Gray: The Risk of Doing Business with Hackers

Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?
Jessica StainerNovember 24, 2025

Webinar

Coalition Data Advantage

Coalition Data Advantage

Webinar

Cyber Loss Control: Advise With Confidence

Cyber Loss Control: Advise With Confidence

Webinar

Coalition Security Advantage

Coalition Security Advantage

Article

PCI DSS Compliance: A Guide

PCI DSS Compliance: A Guide

Article

7 Secure Remote Access Best Practices for Small Businesses

7 Secure Remote Access Best Practices for Small Businesses

Maximize your

coverage for digital

and technology risks

Protect your business from technology risks with Active Cyber and Tech E&O insurance offered by Coalition.

Tech_E+O_4