Resources

Filters

Report

3rd Annual Penetration Risk Report

The 2020 Securealities Risk Report has uncovered several alarming trends in overall security posture that leave many organizations at risk of a breach or other exposure.

December 31, 2020

  • Cybersecurity

Data Sheet

Threat and Vulnerability Management

When defending your organization’s network and systems against vulnerabilities, knowing where to start is critical. Coalfire’s threat and vulnerability management (TVM) program provides you with a programmatic approach to effectively identify, secure, manage, and communicate your security posture.

November 17, 2020

  • Cybersecurity

Video

Building a Threat Model

The organizational threat model comprises business priorities, technology, threat analysis, and security operations. In this video, learn what each element encompasses and how it can help your enterprise improve its long-term security posture.

October 28, 2020

  • Cybersecurity

Video

Establishing Attack Simulations

Learn more about how Coalfire Labs establishes attack simulations in an effort to make a security program the most successful it can be.

October 7, 2020

  • Cybersecurity

Video

Security Program Architecture

In this video snippet, Mike Weber, vice president of Coalfire Labs, explains how Coalfire’s approach to security program architecture can help make your enterprise’s security program successful.

August 13, 2020

  • Cybersecurity
  • Cloud

Video

Penetration Testing the Cloud

Watch this video and learn about how Coalfire finds risks in a cloud environment and how that needs to be different than finding risk in a typical on-premise environment.

July 29, 2020

  • Cybersecurity
  • Cloud

Webinar

Penetration Testing in the Cloud

In this webinar, learn how the movement to the cloud has caused the demise of black box testing and how that impacts organizations across the world.

July 24, 2020

  • Cybersecurity
  • Cloud

White Paper

Threat and Vulnerability Management

Cybersecurity is hard. Careful planning and discipline are required to build an appropriate cyber security program for an organization. Selecting the appropriate technologies and operational models can be complex - there’s a technology available for every security situation imaginable.

June 26, 2020

  • Cybersecurity