🎉 Exciting news! Coalition has acquired Wirespeed to accelerate cybersecurity for all.
Cyber Incident? Get Help
Topic

Incident Response

Security

Blog

Shades of Gray: The Risk of Doing Business with Hackers

Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?
Jessica StainerNovember 24, 2025
Security

Blog

Why We Acquired Wirespeed

How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.
Sisi LiuNovember 06, 2025
Security

Blog

How Threat Actors Are Outsmarting Your Email Defenses

Coalition Incident Response has seen an uptick in phishing attacks via Microsoft 365’s Direct Send feature. How does that work?
Joshua SmithOctober 01, 2025
Security

Blog

Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks

Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?
Devin CanavanAugust 06, 2025
Cyber Insurance

Blog

UK Government Issues Response to Public Ransomware Consultation

Coalition shares its perspective after the UK government published its official response to the public consultation on ransomware legislation.
Sezaneh SeymourJuly 28, 2025
Security

Blog

Not All Endpoint Security Solutions Are Created Equal

As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
Jason VitaleJune 28, 2025
Security

Blog

How MDR Elevates the Role of In-house Security and IT Teams

A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.
Jamie McGrorySeptember 10, 2024
Cyber Insurance

Blog

Familiar Threat Actor Attack Tactics Find New Life

Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.
Gregory AndersenJune 27, 2024
Cyber Insurance

Blog

The Double-Edged Sword of Using Boundary Devices

Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
Gregory AndersenApril 18, 2024
Cyber Insurance

Blog

Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning

Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.
Sezaneh SeymourApril 08, 2024
Cyber Insurance

Blog

Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)

During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.
Gregory AndersenFebruary 20, 2024
Security

Blog

QR Codes Increasingly Used in Phishing Attacks

Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
Jason VitaleJanuary 11, 2024
Security

Blog

Coalition Security Services: More Protection From Cyber Risk

Learn about our expanded security offering, Coalition Security Services, and how it can help protect your business from cyber risks.
John B. RobertsDecember 14, 2023
Security

Blog

SysAid Zero-Day Exploited to Deploy Ransomware

A vulnerability targeting SysAid On-Prem allows threat actors to deploy ransomware. Learn how Coalition Security Labs is responding.
Scott WalshNovember 09, 2023
Cyber Insurance

Blog

Federal Government Says Cyber Hygiene is No Longer Optional

Discussions on cybersecurity and data privacy are here to stay at the federal level, as regulators continue to zero in on the fact that data is invaluable.
Gregory AndersenAugust 24, 2023