![Blog Images 2022 Hour glass tile](/assets/imager/images/27845/Blog-Images-2022-Hour-glass_tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27845/Blog-Images-2022-Hour-glass_tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27845/Blog-Images-2022-Hour-glass_tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
Coalfire Articles
![Blog Images 2022 Hour glass tile](/assets/imager/images/27845/Blog-Images-2022-Hour-glass_tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27845/Blog-Images-2022-Hour-glass_tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27845/Blog-Images-2022-Hour-glass_tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
Application security
Please Stop Managing Vulnerabilities in Excel Spreadsheets
4 min read
July 15, 2020
Read more
![Blog Images 2022 07 10 Crooks Tile](/assets/imager/images/27840/Blog-Images-2022-07_10_Crooks_Tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27840/Blog-Images-2022-07_10_Crooks_Tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27840/Blog-Images-2022-07_10_Crooks_Tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
![Blog Images 2022 07 10 Bowden Tile](/assets/imager/images/27821/Blog-Images-2022-07_10_Bowden_Tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27821/Blog-Images-2022-07_10_Bowden_Tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27821/Blog-Images-2022-07_10_Bowden_Tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
Cybersecurity
The Basics of Exploit Development 4: Unicode Overflows
13 min read
July 10, 2020
Read more
![Blog Images 2022 07 01 Tile](/assets/imager/images/27815/Blog-Images-2022-07_01_Tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27815/Blog-Images-2022-07_01_Tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27815/Blog-Images-2022-07_01_Tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
Application security
Successful DevSecOps Begins With a Cultural Shift
3 min read
July 1, 2020
Read more
![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
Application security
What’s in a Name? – Why Gartner Picking “Application Vulnerability Correlation” is an Important Step for the Application Security Market
5 min read
July 1, 2020
Read more
![Blog Images 2022 06 26 Tile](/assets/imager/images/27806/Blog-Images-2022-06_26_Tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27806/Blog-Images-2022-06_26_Tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27806/Blog-Images-2022-06_26_Tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
![Blog Images 2022 06 25 Tile](/assets/imager/images/27794/Blog-Images-2022-06_25_Tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27794/Blog-Images-2022-06_25_Tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27794/Blog-Images-2022-06_25_Tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
![Blog Images 2022 06 19 Tile](/assets/imager/images/27789/Blog-Images-2022-06_19_Tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27789/Blog-Images-2022-06_19_Tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27789/Blog-Images-2022-06_19_Tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)