Resources

Filters

White Paper

Standing Up a Privacy Program: A User’s Guide

This white paper dives into collection strategies for inventorying data and the design process and considerations when trying to reduce exposure to unwanted regulatory scrutiny, loss of customer trust, loss of potential business opportunities, and negative press coverage.

November 18, 2020

  • Cyber Risk Advisory

Webinar

Don't Hesitate...Automate! FedRAMP® Made Easier

This webinar explores ways to simplify and accelerate the FedRAMP process through compliance automation techniques. FedRAMP authorization is the key to Cloud Service Providers (CSPs) accessing the enormous Federal market, tapping into new revenue streams, and transforming a strong cybersecurity posture into a powerful market differentiator.

November 17, 2020

  • Compliance
  • FedRAMP®

Data Sheet

Threat and Vulnerability Management

When defending your organization’s network and systems against vulnerabilities, knowing where to start is critical. Coalfire’s threat and vulnerability management (TVM) program provides you with a programmatic approach to effectively identify, secure, manage, and communicate your security posture.

November 17, 2020

  • Cybersecurity

Webinar

Your Secure Cloud: Planning for Success

This webinar features of panel comprising some of the industry’s top cloud experts, who discuss their real-world experience and the latest market research to help you navigate your secure cloud deployment—from strategy through to optimization.

November 17, 2020

  • Cloud

White Paper

Application Security Year-Over-Year

This is a brief walkthrough of app-specific highlights from our 3rd Annual Penetration Risk Report, that shows how application security matters appear throughout our datasets.

November 13, 2020

  • Application security

Data Sheet

Internet of Things Product Security

The number of connected devices has skyrocketed in the past few years thanks to modern technology. Because of IoT’s rapid evolution, innovative disruptions are occurring at a staggering pace, especially in the industrial IoT (IIoT) and smart infrastructure, consumer IoT, and medical IoT (IoMT) spaces.

November 13, 2020

  • Application security

Case Study

Top 5 Global Bank Reduces Total Cost of PCI Compliance by Migrating to the Cloud

Already heavily invested in multiple private clouds, this well-known global bank was historically averse to moving confidential data to the public cloud. Ongoing COVID-related economic pressures led the bank to accelerate a pilot program that established a landing zone in Amazon Web Services (AWS) for PCI applications, enabling them to benefit from the standard OpEx versus CapEx advantage.

November 13, 2020

  • Compliance

Video

Building a Threat Model

The organizational threat model comprises business priorities, technology, threat analysis, and security operations. In this video, learn what each element encompasses and how it can help your enterprise improve its long-term security posture.

October 28, 2020

  • Cybersecurity