![](png/sonicwall_ngfw_security_alert_security-labs9e7f.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1mgP1Liu4sXuXY8lB1Hg50%2Fe9509784593b3f6b666c703b8960625e%2FSONICWALL_NGFW_Security_Alert_Security-Labs.png&w=3840&q=75)
SonicWall Firewall Devices Vulnerable to DoS Attacks
SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
![](png/ivanti_security_alert_security-labs__1_1a4f.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3thnbLPfhIsoVPH5uFuQIe%2Fbb97a89f49b374f34aec31a57f3fb223%2FIvanti_Security_Alert_Security-Labs__1_.png&w=3840&q=75)
Ivanti VPN Zero-Day Avoided with Device Isolation
Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.
![](png/security-labs-qr04bf.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1Kz6S4X8ifz4VGcRWovsMG%2Fad479f2801b2b956e8253feb4d1691a6%2FSecurity-Labs-QR.png&w=3840&q=75)
QR Codes Increasingly Used in Phishing Attacks
Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
![](jpg/blog_international_retrospective_v22d7b.jpg?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4KRs7czmuv8h5iomhPkMUV%2Fc1117027591dff1ea7fc51d887bd95ff%2FBlog_International_Retrospective_V2.jpg&w=3840&q=75)
Global Reflections: Revisiting Coalition’s Growth in 2023
New geographies, new market segments, new products, and even new languages. Here's how we stuck to our mission of protecting the unprotected.
![](png/security_alert__guidance_for_end-of-life_microsoft_iis_864a5.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7Bz4XbchC87xy2xRJo51CS%2F1ccc06e0fa794b19dae94a1d4a0f8b72%2FSecurity_Alert__Guidance_for_End-of-Life_Microsoft_IIS_8.5__1_.png&w=3840&q=75)
Guidance for Hosted End-Of-Life Microsoft IIS 8.5
Microsoft Internet Information Services (IIS) 8.5 went end-of-life (EOL) on October 10, 2023. Learn how to handle hosted IIS 8.5.
![](png/blog_seclabs-cyber-riskc4be.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2DB6nxsHoEs35LHD9wp9az%2Faabd7e5867b2188a22a9c5370afc6cdb%2FBlog_SecLabs-Cyber-Risk.png&w=3840&q=75)
Coalition Security Services: More Protection From Cyber Risk
Learn about our expanded security offering, Coalition Security Services, and how it can help protect your business from cyber risks.
Cyber Insurance
![](jpg/blog_international_retrospective_v22d7b.jpg?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4KRs7czmuv8h5iomhPkMUV%2Fc1117027591dff1ea7fc51d887bd95ff%2FBlog_International_Retrospective_V2.jpg&w=3840&q=75)
Global Reflections: Revisiting Coalition’s Growth in 2023
New geographies, new market segments, new products, and even new languages. Here's how we stuck to our mission of protecting the unprotected.
![](png/blog_pay-on-behalf76f5.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7qjCeq83CG7xly03qY5iZO%2F396b8b45e2332e5dcd0513f90bb38bb4%2FBlog_Pay-on-behalf.png&w=3840&q=75)
Pay on Behalf: Why Coalition Coverage Handles Upfront Costs for Policyholders
Cyber events can be costly, and most businesses can’t afford a massive loss. So who’s responsible for payment while an insurance claim is in progress?
![](png/blog_resolve-alerts5077.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2MH2gZRl0Mk8ynDOjBwTKG%2F563dbc0ee9793972618415e99dcbe50d%2FBlog_Resolve-Alerts.png&w=3840&q=75)
How Our Security Support Center Helps Clients Resolve Alerts
Learn how our Security Support Center helps policyholders understand and resolve alerts and critical security findings to avoid cyber insurance claims.
Security Labs
![](png/sonicwall_ngfw_security_alert_security-labs9e7f.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1mgP1Liu4sXuXY8lB1Hg50%2Fe9509784593b3f6b666c703b8960625e%2FSONICWALL_NGFW_Security_Alert_Security-Labs.png&w=3840&q=75)
SonicWall Firewall Devices Vulnerable to DoS Attacks
SonicWall NGFW series 6 and 7 devices are vulnerable to two critical CVEs that can lead to denial-of-service attacks. Learn what steps businesses should take.
![](png/ivanti_security_alert_security-labs__1_1a4f.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3thnbLPfhIsoVPH5uFuQIe%2Fbb97a89f49b374f34aec31a57f3fb223%2FIvanti_Security_Alert_Security-Labs__1_.png&w=3840&q=75)
Ivanti VPN Zero-Day Avoided with Device Isolation
Two zero-day vulnerabilities are impacting Ivanti VPN devices. Learn how proactive outreach to Coalition policyholders is helping mitigate the threat.
![](png/security-labs-qr04bf.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1Kz6S4X8ifz4VGcRWovsMG%2Fad479f2801b2b956e8253feb4d1691a6%2FSecurity-Labs-QR.png&w=3840&q=75)
QR Codes Increasingly Used in Phishing Attacks
Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
Executive Risks
![](jpg/blog-d_oe2e9.jpg?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3yUNzeSGIQHDUfqmEJqAJm%2Fe5259cc7ad0d721883189576e19f88db%2FBlog-D_O.jpg&w=3840&q=75)
How Cyber Insurance Can Prevent Attacks from Spiraling into D&O Claims
Cyber insurance helps protect businesses against financial and reputational damages, but its impact on D&O liability makes it a must-have for all executives.
![](jpg/coalition_blog-when_crime_and_cyber_insurance_combine-2486b.jpg?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3PhdkctdOhfUKzAthl71cg%2F0d9e78d3a88f3f472a14b4f0c3b6fd38%2FCoalition_Blog-When_Crime_and_Cyber_Insurance_Combine-2.jpg&w=3840&q=75)
Combining Crime and Cyber: Common Claims and Core Coverages
Cybercrimes often fall between two types of insurance policies: crime and cyber. Both can coexist in harmony for the benefit of the policyholder.
![](jpg/blog-fiduciary-excessive-fee-litigationcd03.jpg?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F3JtG9hGYf9vvwrm7qn7PyH%2F583edc1dd397d7b3cbac199fc1f86b87%2FBlog-Fiduciary-Excessive-Fee-Litigation.jpg&w=3840&q=75)
To Avoid Excessive Fee Litigation, SMBs Must Fulfill Fiduciary Duties
Excessive fee lawsuits have historically targeted large employee benefits plans, but smaller plans have experienced a surge of claims in recent years.
More from the blog
Broker Education
Coalition provides technology built for brokers that allows them to rate, quote, and bind in minutes. Learn best practices from the community.
All Articles >
Our Coalition
Organizations of all types are realizing enormous benefits from digital technology. However, they also face new, fast moving and far reaching digital risks. Read more about what our team is doing every day to protect organizations from these risks.
All Articles >
Who is Coalition?
At Coalition, we're on a mission to protect the unprotected. To achieve this, we're building a new approach to risk that actively protects organizations in a digital world.
![Woman dealing with cyber claims on her laptop while holding some paper](png/group_10106162.png?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F1jyAFmg17VGDpdkIKLdZJd%2F9bd327fd39822543cb4016b7348c6e4c%2FGroup_1010.png&w=3840&q=75)