Incident Response

Blog
Shades of Gray: The Risk of Doing Business with Hackers
Gray hat hackers may appear altruistic, but attitudes can turn quickly when money is involved. How should businesses decide who to trust?

Blog
Why We Acquired Wirespeed
How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.

Blog
How Threat Actors Are Outsmarting Your Email Defenses
Coalition Incident Response has seen an uptick in phishing attacks via Microsoft 365’s Direct Send feature. How does that work?

Blog
Timely Reporting Can Be the Deciding Factor in Cyber Insurance
The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.

Blog
Living Off the Land: How Hackers Exploit Victims’ Own Tools to Execute Attacks
Threat actors are using your operating system’s built-in tools to execute attacks and remain undetected. How can your business fight back?

Blog
UK Government Issues Response to Public Ransomware Consultation
Coalition shares its perspective after the UK government published its official response to the public consultation on ransomware legislation.

Blog
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.

Blog
What Happens When Threat Actors Go Rogue?
Coalition Incident Response has recently seen cases of rogue threat actors finding creative ways to profit. Here’s how businesses can fight back.

Blog
6 Cost-Related Questions Every Business Should Ask About Cyber Risk
Get answers on security budgeting, average cyber attack costs, and which solutions deliver the best ROI with the Coalition Security Cost Savings Calculator.

Blog
Why the Best Security Partner for SMBs Might Be a Cyber Insurance Provider
Small and midsize businesses need a security partner who's invested in their well-being — so why not a cyber insurance provider?

Blog
How Email Logs Tell the Story Behind an Inbox Compromise
If an email account is compromised, you’re going to want to know the story of what happened. Email logs can help.

Blog
The Mission of a Strategic Cyber Pro
A strategic cyber pro must achieve an appropriate risk posture, plan ahead to minimize damage, and find creative ways to drive business value.

Blog
How MDR Elevates the Role of In-house Security and IT Teams
A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.

Blog
Cybersecurity Burnout Is Crushing Your Effectiveness
When security professionals are drowning in alerts or not getting them at all, the truly harmful cyber threats can slip through the cracks.











