
Blog
After Mythos: What Actually Changes for Cyber Risk
Why the sky isn't falling, where the threat surface genuinely expands, and why point-in-time cyber underwriting is running out of road.

Blog
Allie K. Miller Explains How to Use AI to Shape Your Workday
Discover why Allie K. Miller says the tool phase of AI is over and why high-agency leadership and autonomous teammates are the keys to mastering the AI age.

Blog
Meet Broker IQ: Your Intelligent Cyber Insurance Workspace
Broker IQ is the intelligent cyber insurance workspace that helps maximize quoting efficiency, accelerate sales, and amplify cyber expertise.

Blog
‘Bleed’ Trilogy Complete With Newest Memory Leak in Citrix NetScaler
For the third time in as many years, businesses are being urged to patch a “bleed”-style vulnerability in Citrix NetScaler.

Blog
Active Insurance is Built to Dominate the AI Risk Landscape
While much of the insurance industry treats AI as a terrifying, unquantifiable specter, Coalition policies have always been designed to respond to AI risks.

Blog
How Geopolitical Tension Can Spotlight Latent Cyber Risks
Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.
Cyber Insurance
See all

Blog
After Mythos: What Actually Changes for Cyber Risk
Why the sky isn't falling, where the threat surface genuinely expands, and why point-in-time cyber underwriting is running out of road.

Blog
Active Insurance is Built to Dominate the AI Risk Landscape
While much of the insurance industry treats AI as a terrifying, unquantifiable specter, Coalition policies have always been designed to respond to AI risks.

Blog
5 Essential Insights From Our 2026 Cyber Claims Report
Discover how Active Insurance is helping businesses overcome the Cyber Protection Paradox with insights from Coalition’s 2026 Cyber Claims Report.
Security
Security

Blog
‘Bleed’ Trilogy Complete With Newest Memory Leak in Citrix NetScaler
For the third time in as many years, businesses are being urged to patch a “bleed”-style vulnerability in Citrix NetScaler.

Blog
How Geopolitical Tension Can Spotlight Latent Cyber Risks
Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.







