Control

Blog
Security Alert: rsync Vulnerability Allows for Remote Code Execution
Coalition proactively notified policyholders about vulnerabilities in the popular rsync (remote sync) file-synchronizing tool.

Blog
Introducing Cyber Health Rating
Cyber Health Rating is a comprehensive cyber health metric in Coalition Control® that provides actionable steps to improve your cybersecurity posture.

Blog
As Zero Days Increase, SMBs Need More Help With Fast-Moving Risks
Coalition’s Zero-Day Alerts give small and midsize businesses a fast and reliable way to stay informed about zero-day vulnerabilities.

Blog
Introducing Coalition Security Copilot
Coalition Security Copilot gives policyholders an AI-driven assistant designed to provide personalized guidance for managing security risks.

Blog
Introducing Coalition Security Awareness Training
Coalition Security Awareness Training makes it easy for small businesses to educate employees on cybersecurity, monitor performance, and track compliance.

Blog
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.

Blog
XZ Near Miss Sheds Light on Vulnerability, Patching Issues
The recent XZ Utils backdoor uncovered the potential risks associated with vulnerabilities in open-source systems.

Blog
Control Cyber Risk from the Inside Out
Coalition Control™ integrates with cloud providers Microsoft 365, Google Workspace, and AWS to allow customers to manage digital risks in a single platform.

Blog
Empower Your Clients (and Yourself) With More Visibility Into Cyber Risks
Increased visibility across Coalition's quoting and risk management platforms can empower you as a cyber risk advisor.

Blog
Coalition Security Services: More Protection From Cyber Risk
Learn about our expanded security offering, Coalition Security Services, and how it can help protect your business from cyber risks.

Blog
How to Mitigate the Risks of Internet-Exposed RDP
Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.

Blog
How to Improve Client Insurability Using Actionable Security Insights
Businesses can gain a security advantage over threat actors through a deeper understanding of the most common and highly exploitable cybersecurity weaknesses.

Blog
How Our Security Support Center Helps Clients Resolve Alerts
Learn how our Security Support Center helps policyholders understand and resolve alerts and critical security findings to avoid cyber insurance claims.

Blog
Prioritizing Exposures Gives Clients a Security Advantage
Focusing on the security exposures that are most likely to result in loss allows policyholders to prioritize their time and effort on impactful improvements.
