Security

Blog
The Endpoint Security Tool You May Already Be Paying For
Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.

Blog
Risky Tech Ranking: Q2 2025 Updates
See how Coalition’s Risky Tech Ranking evolved in Q2 2025 with updates on the number of vendors scored, contributing vulnerabilities, and more.

Blog
Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks
Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.

Blog
Defense in Depth: Building a Multi-Layered Security Strategy
Determining which security controls will make the biggest impact can be challenging. Explore the 5 focus areas for building a defense-in-depth strategy.

Blog
Deepfakes Are Making Cyber Scams More Difficult to Detect
While deepfakes introduce a need for increased scrutiny, businesses can combat the rise of AI-enhanced technology with always-on security awareness.

Blog
Attackers Actively Targeting Critical Vulnerability in SonicWall SSL VPN
Coalition notified policyholders about an unpatched vulnerability in SonicWall SSL VPNs that is being actively exploited by threat actors in the wild.

Blog
Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks
Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?

Blog
Scattered Spider: Hacker Collective Ensnaring Industry-Specific Targets
The Scattered Spider threat actor group is known for systematically targeting IT help desks and vendors at large organizations within specific industries.

Blog
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.

Blog
Study Finds Small Businesses Underestimate Cyber Risk Reality
Coalition’s new Small Business Cybersecurity Study uncovers small business leaders’ experiences with and perceptions of cyber risk.

Blog
Security Alert: BeyondTrust Remote Products Vulnerable to Exploitation
Coalition proactively notified policyholders about a high-severity BeyondTrust vulnerability and shared recommended mitigation steps.

Blog
What Happens When Threat Actors Go Rogue?
Coalition Incident Response has recently seen cases of rogue threat actors finding creative ways to profit. Here’s how businesses can fight back.

Blog
6 Cost-Related Questions Every Business Should Ask About Cyber Risk
Get answers on security budgeting, average cyber attack costs, and which solutions deliver the best ROI with the Coalition Security Cost Savings Calculator.

Blog
Limiting Employee Access Can Reduce Your Cyber Exposure
Role-based access control can strengthen your security posture by reducing employee error and malicious insiders while addressing compliance requirements.
