Resources

Filters

Video

ThreadFix® Filters Tutorial

Filters are a powerful capability in ThreadFix® that are used extensively in our reporting, as well as for configuring policies. In this video, we will look at how to create filters, and some of the ways they can be used to create customized views for vulnerability analysis and reporting.

December 18, 2020

  • Application security
  • ThreadFix®

Video

ThreadFix® Policies Tutorial

In this video we will talk about the different kinds of policies and how they can be used to support your security efforts. The four different kinds of policies are: Filter policies, Pass Criteria policies, Defect Reporter policies, and Time to Remediate policies.

December 18, 2020

  • Application security
  • ThreadFix®

Video

ThreadFix® Remote Provider Tutorial

In this video, we’ll discuss how remote providers can be used to automate and ease the ingestion of vulnerability data into ThreadFix®.

December 18, 2020

  • Application security
  • ThreadFix®

Video

ThreadFix® Roles and Permissions Tutorial

ThreadFix® is the industry-leading vulnerability resolution platform that provides a window into the state of application security programs for organizations that build software. Roles and permissions can be managed to restrict and provide access to individuals, teams and role types within ThreadFix.

December 18, 2020

  • Application security
  • ThreadFix®

Video

ThreadFix® Terminology Tutorial

In this video, we’ll provide an introduction to some of the commonly used terms you will come across while working in the ThreadFix® platform.

December 18, 2020

  • Application security
  • ThreadFix®

Video

Application Security Programs

Modern development practices are continuously pushing changes through the pipeline, and point-in-time testing is not sufficient to address today's security concerns. Learn more about application security programs now in this short video.

December 15, 2020

  • Application security

Video

Building a Threat Model

The organizational threat model comprises business priorities, technology, threat analysis, and security operations. In this video, learn what each element encompasses and how it can help your enterprise improve its long-term security posture.

October 28, 2020

  • Cybersecurity

Video

Establishing Attack Simulations

Learn more about how Coalfire Labs establishes attack simulations in an effort to make a security program the most successful it can be.

October 7, 2020

  • Cybersecurity