Resources

Filters

Webinar

A Deep Dive into Coalfire®'s 2019 Penetration Test Results

In this webinar, we will discuss the anonymized, aggregate findings of consulting engagements conducted by Coalfire Labs for external network, internal network and application penetration tests and social engineering. These results were recently published in our 2019 Securealities Penetration Risk Report.

January 21, 2020

  • Cybersecurity

Report

Penetration Risk Report 2019

The Annual Penetration Risk Report provides a detailed look into the datasets tracked and analyzed over the last year of hundreds of engagements and penetration tests by Coalfire Labs, yielding unexpected insights and significant new trends.

November 12, 2019

  • Cybersecurity

Report

Cloud Security Intelligence Report

The Securealities report, Cloud Security Intelligence Report, provides a detailed look at how organizations are responding to security threats in the cloud. The report highlights what is and is not working for security operations teams in securing their cloud data, systems, and services in the cloud shared responsibility model.

September 17, 2019

  • Cybersecurity

Report

Penetration Risk Report

An analysis of cyber risk vulnerabilities affecting specific industry verticals, business size and network specific attack vectors.

June 8, 2018

  • Cybersecurity

Video

System Baseline Hardening Deployment

Many compliance programs, such as PCI DSS, HIPAA, FISMA and CGIS require a hardened baseline to be implemented within an organization’s information systems. Learn how to build a hardened baseline, examine some of the tools to assist in a phased approach to deployment, demo Ansible and Microsoft compliance manager and discuss some common issues.

December 12, 2017

  • Cybersecurity

Data Sheet

Penetration Testing: Exploiting Vulnerabilities to Prevent Real Attacks

By using sophisticated penetration tests, you can confidently secure your data and your customers’ data from evolving threats and continuous attacks. While mandated by compliance requirements, pen tests are also the best way to prove you’re prepared for a malicious attack.

June 28, 2017

  • Cybersecurity