Security

Blog
Remove Polyfill.io to Prevent Malicious Attacks
Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.

Blog
Security Alert: What to Know About Threat Actor Volt Typhoon
Microsoft and CISA warned that the Chinese APT Volt Typhoon is targeting critical infrastructure by living off the land. Learn the risks of this technique.

Blog
Coalition Security Week: Working together to take control
Leading solutions providers including Okta, SentinelOne, and Malwarebytes will discuss a wide range of cybersecurity topics and best practices for controlling risk in a dynamic and challenging IT environment.

Blog
From Understaffed Firefighters to Value-Adders: The Changing Role of SMB Cybersecurity Teams
Most SMBs could get more out of their cybersecurity function if the people handling security could get ahead of the daily grind of alerts.

Blog
August Risk Roundup: Vulns, phishing, and ransomware — the cyber evolution continues
Flexibility is a requirement for good cybersecurity in the 8/13/21 Risk Roundup. This is our weekly TL;DR and useful snippets on topics we’re watching closely.

Blog
Cyber meltdown and the spectre of uninsurable risk
Could a single cyber event hit many insurance policyholders at the same time, resulting in huge potential claims payouts? How could this affect your coverage?

Blog
Empowering MSPs as Trusted Cyber Risk Advisors
IT Nation Connect 2024 was a testament to the collaborative spirit of the managed service provider community and opportunities for deeper relationships.

Blog
3 methods of cyber deception: Bait the attacker to turn the tables on ransomware
By now, ransomware doesn’t need much of an introduction. Are we utterly powerless in the face of ransomware? Discover cyber deception methods with Incident Response Lead Shelley Ma.

Blog
Coffee with your future hacker: Why you want 2FA and need to avoid FTF
Imagine you have the opportunity to sit down with your future hacker. What would they say? We know: enable Two-factor Authentication (2FA) and avoid funds transfer fraud.

Blog
Security Week recap: Cybersecurity is a team sport
To enable organizations to control their cyber risk, Coalition recently concluded our inaugural Security Week with internal and external security and claims partners.

Blog
The Psychology of Social Engineering
The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.

Blog
Everything You Always Wanted to Know About Ransomware Negotiation (But Were Afraid to Ask)
Have you ever wondered how ransomware negotiations and payments happen? An Incident Responder breaks down everything from crypto to AI and more.

Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.

Blog
Why we love EDR: Better detection and response to malware
As the cybersecurity landscape evolves and attacks become harder to detect, endpoints are left incredibly vulnerable. Find out what EDR solutions we recommend to mitigate the risk.
