Data Sheet
A solid privacy program is no longer just a compliance question – it’s a competitive
requirement. Going forward, the question of privacy cannot be answered with a
simple privacy policy and contract language.
August 12, 2021
Data Sheet
Coalfire’s Secure CI/CD methodology helps you strategically evaluate, develop, and
mature your secure software development program within your DevOps model.
July 2, 2021
Data Sheet
Ransomware attacks are on the rise. In 2020, the number of attacks worldwide increased by 485% year over year. Because recovering from a ransomware attack can be a costly, time-consuming process that hinders an organization’s ability to conduct normal business, you need to take steps now to properly protect yourself.
June 21, 2021
Data Sheet
When defending your organization’s network and systems against vulnerabilities, knowing where to start is critical. Coalfire’s threat and vulnerability management (TVM) program provides you with a programmatic approach to effectively identify, secure, manage, and communicate your security posture.
November 17, 2020
Data Sheet
The number of connected devices has skyrocketed in the past few years thanks
to modern technology. Because of IoT’s rapid evolution, innovative disruptions are
occurring at a staggering pace, especially in the industrial IoT (IIoT) and smart infrastructure, consumer IoT, and medical IoT (IoMT) spaces.
November 13, 2020
Data Sheet
Cloud computing is not a new paradigm, and yet, there is still uncertainty around how
the cloud affects PCI compliance for cloud service providers (CSPs), payment service
providers, and merchants.
September 17, 2020
Data Sheet
The combination of limited resources and a lack of disciplined methodology often
leaves organizations unable to consistently demonstrate business value and reduce
risk. These challenges can lead to an inconsistent application of effective enterprise cyber risk strategy principles.
August 10, 2020
Data Sheet
Businesses are adopting new economic models for managing their technology infrastructures, taking advantage of scale, architecture, third-party providers, and the automation these technologies provide. While these initiatives are designed to improve cost models and enterprise extensibility, they present new cyber risk considerations.
July 30, 2020
Data Sheet
The cybersecurity landscape and the sophistication of cyber attacks are constantly evolving. Too often organizations rely on reactive measures to solve their problems, but now more than ever, they need a proactive approach to security.
June 9, 2020