Webinar
According to Verizon’s 2016 Data Breach investigation report 90% of breaches found, fall into one of ten classifications. All of the identified breaches that were within these classifications could have been prevented with threat advisory and penetration testing programs to evaluate their exposure to threats and vulnerabilities.
February 1, 2017
Case Study
Long considered to be the leaders in physical security, casinos have adapted to the increasing demand for network and internetwork connectivity for gambling devices and backend systems.
November 1, 2016
Case Study
For one major manufacturer, the system security of a new electric vehicle was a top priority.
November 1, 2016
Case Study
Coalfire was engaged to develop, implement, and test an Incident Response plan.
July 19, 2016
Case Study
The Board of Directors of this fast-growing, privately held Ecommerce Company recognized that they are accountable for enterprise risk management, and they were particularly concerned about cyber risk, since one of their recent acquisitions had been victimized by a cyber incident.
July 19, 2016
Case Study
A rapidly growing healthcare insurance provider, successfully compliant with HIPAA/HITECH requirements, needed to secure more than just Protected Health Information stored on their systems.
July 19, 2016
Data Sheet
Coalfire has a dedicated team of application security professionals and certified PA-QSAs who understand the complexities of today’s payment applications, development processes, and industry standards. Coalfire is the industry leader in performing PA assessments and advisory.
June 10, 2016
Data Sheet
The healthcare industry needs to place a higher priority on the security of electronic protected health information (ePHI). To help ensure the safe exchange of ePHI and other personal information, the Health Information Trust Alliance (HITRUST) has established the Common Security Framework (CSF).
June 1, 2016
White Paper
Download this executive review paper to learn about: The difference between HIPAA and HITRUST; The role of the NIST Cybersecurity Framework and SOC 2; The most comprehensive risk management solution.
May 5, 2016