Control

Blog
Introducing Coalition Security Awareness Training
Coalition Security Awareness Training makes it easy for small businesses to educate employees on cybersecurity, monitor performance, and track compliance.

Blog
Powered by the Active Data Graph
Coalition’s Active Data Graph unearths the cyber threats that are most likely to result in losses and distills that data into actionable insights.

Blog
XZ Near Miss Sheds Light on Vulnerability, Patching Issues
The recent XZ Utils backdoor uncovered the potential risks associated with vulnerabilities in open-source systems.

Blog
Control Cyber Risk from the Inside Out
Coalition Control™ integrates with cloud providers Microsoft 365, Google Workspace, and AWS to allow customers to manage digital risks in a single platform.

Blog
Empower Your Clients (and Yourself) With More Visibility Into Cyber Risks
Increased visibility across Coalition's quoting and risk management platforms can empower you as a cyber risk advisor.

Blog
Coalition Security Services: More Protection From Cyber Risk
Learn about our expanded security offering, Coalition Security Services, and how it can help protect your business from cyber risks.

Blog
How to Mitigate the Risks of Internet-Exposed RDP
Learn the risks of internet-exposed Remote desktop protocol (RDP), steps to provide secure remote access, and what Coalition scan data shows about the risk.

Blog
How to Improve Client Insurability Using Actionable Security Insights
Businesses can gain a security advantage over threat actors through a deeper understanding of the most common and highly exploitable cybersecurity weaknesses.

Blog
Prioritizing Exposures Gives Clients a Security Advantage
Focusing on the security exposures that are most likely to result in loss allows policyholders to prioritize their time and effort on impactful improvements.

Blog
Improve Client Insurability With Pre-bind Access to Control
Prospective policyholders can now receive more support from Coalition and streamline the process of resolving pre-bind contingencies.

Blog
Security Alert: What to Know About Threat Actor Volt Typhoon
Microsoft and CISA warned that the Chinese APT Volt Typhoon is targeting critical infrastructure by living off the land. Learn the risks of this technique.

Blog
Announcing Control 2.0: Coalition’s Cyber Risk Management Platform
Coalition Control 2.0 is now live for all users, featuring enhanced attack surface monitoring capabilities and improvements to the user interface.

Blog
Announcing Coalition Security Labs
Announcing Coalition Security Labs, our research and innovation center providing insights to help face the ever-evolving cyber threat landscape.

Blog
The Evolution of Ransomware — a cyber claims perspective
Claims Counsel Kirsten Mickelson shares her perspective on how ransomware has evolved over the last decade, plus how Coalition makes a real difference.
