Data Sheet
Support for over 80 compliance frameworks
Learn More
Video
The organizational threat model comprises business priorities, technology, threat analysis, and security operations. In this video, learn what each element encompasses and how it can help your enterprise improve its long-term security posture.
October 28, 2020
Video
Learn more about how Coalfire Labs establishes attack simulations in an effort to make a security program the most successful it can be.
October 7, 2020
Video
In this video snippet, Mike Weber, vice president of Coalfire Labs, explains how Coalfire’s approach to security program architecture can help make your enterprise’s security program successful.
August 13, 2020
Video
Watch this video and learn about how Coalfire finds risks in a cloud environment and how that needs to be different than finding risk in a typical on-premise environment.
July 29, 2020
Webinar
In this webinar, learn how the movement to the cloud has caused the demise of black box testing and how that impacts organizations across the world.
July 24, 2020
White Paper
Cybersecurity is hard. Careful planning and discipline are required to build an appropriate cyber security program for an organization. Selecting the appropriate technologies and operational models can be complex - there’s a technology available for every security situation imaginable.
June 26, 2020
Data Sheet
The cybersecurity landscape and the sophistication of cyber attacks are constantly evolving. Too often organizations rely on reactive measures to solve their problems, but now more than ever, they need a proactive approach to security.
June 9, 2020
Data Sheet
An organization’s ability to detect and respond to a cyber incident can mean the difference between an internal planning exercise and headline news. No matter the industry, size, or location of your data, compromises can happen.
June 1, 2020
Data Sheet
As the threat landscape continues to become more sophisticated, security professionals around the world are challenged to look beyond the typical list of attacks and think about new threats – even those that have never been considered.
April 10, 2020