Resources

Filters

Data Sheet

Privacy Advisory and Assessment Services

A solid privacy program is no longer just a compliance question – it’s a competitive requirement. Going forward, the question of privacy cannot be answered with a simple privacy policy and contract language.

August 12, 2021

  • Cyber Risk Advisory

Data Sheet

Secure CI/CD

Coalfire’s Secure CI/CD methodology helps you strategically evaluate, develop, and mature your secure software development program within your DevOps model.

July 2, 2021

  • Cloud

Data Sheet

Ransomware Readiness Assessment

Ransomware attacks are on the rise. In 2020, the number of attacks worldwide increased by 485% year over year. Because recovering from a ransomware attack can be a costly, time-consuming process that hinders an organization’s ability to conduct normal business, you need to take steps now to properly protect yourself.

June 21, 2021

  • Cyber Risk Advisory

Data Sheet

Threat and Vulnerability Management

When defending your organization’s network and systems against vulnerabilities, knowing where to start is critical. Coalfire’s threat and vulnerability management (TVM) program provides you with a programmatic approach to effectively identify, secure, manage, and communicate your security posture.

November 17, 2020

  • Cybersecurity

Data Sheet

Internet of Things Product Security

The number of connected devices has skyrocketed in the past few years thanks to modern technology. Because of IoT’s rapid evolution, innovative disruptions are occurring at a staggering pace, especially in the industrial IoT (IIoT) and smart infrastructure, consumer IoT, and medical IoT (IoMT) spaces.

November 13, 2020

  • Application security

Data Sheet

PCI in the Cloud

Cloud computing is not a new paradigm, and yet, there is still uncertainty around how the cloud affects PCI compliance for cloud service providers (CSPs), payment service providers, and merchants.

September 17, 2020

  • Compliance

Data Sheet

CISO+

The combination of limited resources and a lack of disciplined methodology often leaves organizations unable to consistently demonstrate business value and reduce risk. These challenges can lead to an inconsistent application of effective enterprise cyber risk strategy principles.

August 10, 2020

  • Cyber Risk Advisory

Data Sheet

Enterprise Cyber Risk Assessment

Businesses are adopting new economic models for managing their technology infrastructures, taking advantage of scale, architecture, third-party providers, and the automation these technologies provide. While these initiatives are designed to improve cost models and enterprise extensibility, they present new cyber risk considerations.

July 30, 2020

  • Cyber Risk Advisory

Data Sheet

Vulnerability Management

The cybersecurity landscape and the sophistication of cyber attacks are constantly evolving. Too often organizations rely on reactive measures to solve their problems, but now more than ever, they need a proactive approach to security.

June 9, 2020

  • Cybersecurity