Resources

Filters

Data Sheet

Instructor-Led Application Security Training

Build baseline application security fundamentals inside your development teams with additional education and training resources that expand your AppSec program.

February 10, 2022

  • Application security

Data Sheet

IoT Security Assessment

Securing your internet of “things” through end-to-end security testing and scrutinization.

February 10, 2022

  • Cybersecurity
  • Application security

Data Sheet

Secure Code Review

Equipping you with the proactive insight required to prevent production-based reactions.

February 10, 2022

  • Application security

Data Sheet

Privacy Advisory and Assessment Services

A solid privacy program is no longer just a compliance question – it’s a competitive requirement. Going forward, the question of privacy cannot be answered with a simple privacy policy and contract language.

August 12, 2021

  • Cyber Risk Advisory

Data Sheet

Secure CI/CD

Coalfire’s Secure CI/CD methodology helps you strategically evaluate, develop, and mature your secure software development program within your DevOps model.

July 2, 2021

  • Cloud

Data Sheet

Ransomware Readiness Assessment

Ransomware attacks are on the rise. In 2020, the number of attacks worldwide increased by 485% year over year. Because recovering from a ransomware attack can be a costly, time-consuming process that hinders an organization’s ability to conduct normal business, you need to take steps now to properly protect yourself.

June 21, 2021

  • Cyber Risk Advisory

Data Sheet

Threat and Vulnerability Management

When defending your organization’s network and systems against vulnerabilities, knowing where to start is critical. Coalfire’s threat and vulnerability management (TVM) program provides you with a programmatic approach to effectively identify, secure, manage, and communicate your security posture.

November 17, 2020

  • Cybersecurity

Data Sheet

Internet of Things Product Security

The number of connected devices has skyrocketed in the past few years thanks to modern technology. Because of IoT’s rapid evolution, innovative disruptions are occurring at a staggering pace, especially in the industrial IoT (IIoT) and smart infrastructure, consumer IoT, and medical IoT (IoMT) spaces.

November 13, 2020

  • Application security