Cyber Insurance

Blog
Why Coalition is Bringing Active Cyber Insurance to Germany
Growing concerns around cyber risk and low cyber insurance adoption rates among all business segments make Germany an obvious choice for Coalition expansion.

Blog
CrowdStrike Outage: Policyholder Guidance and Insurance Implications
The global outage triggered by CrowdStrike has raised questions about how cyber insurance will respond and whether the industry can insure widespread events.

Blog
Introducing Coalition Security Awareness Training
Coalition Security Awareness Training makes it easy for small businesses to educate employees on cybersecurity, monitor performance, and track compliance.

Blog
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.

Blog
Familiar Threat Actor Attack Tactics Find New Life
Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.

Blog
Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance
Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.

Blog
Timely Reporting Can Be the Deciding Factor in Cyber Insurance
The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.

Blog
The State of Active Insurance: 2024 Cyber Claims Report
Discover the latest trends in ransomware, funds transfer fraud, risky technology, and the state of Active Insurance in Coalition’s 2024 Cyber Claims Report.

Blog
The Double-Edged Sword of Using Boundary Devices
Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.

Blog
Control Cyber Risk from the Inside Out
Coalition Control™ integrates with cloud providers Microsoft 365, Google Workspace, and AWS to allow customers to manage digital risks in a single platform.

Blog
Cyber Incident Reporting: Important Questions to Ask for Essential Business Planning
Cyber incident reporting obligations can be complex. Businesses must consider how they will meet the requirements before an incident to expedite the process.

Blog
Change Healthcare Attack Fallout: How Coalition is Responding
The attack on Change Healthcare is a reminder of our shared dependency on technology and the ever-present cyber threats facing modern businesses.

Blog
Ransomware Myths Busted: How Cyber Insurance Impacts Payments
The decision to pay a ransomware demand is complex. Misconceptions about the role of cyber insurance in these incidents can exacerbate the problem.

Blog
Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)
During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.
