White Paper
For years, CISOs have often struggled with gaining access to their Board of Directors. This white paper outlines the top five principles for navigating discussions at this level to garner support and address business needs.
Webinar
Coalfire's webinar details 2020's top security weaknesses and solutions.
White Paper
This whitepaper dives into how applications can often be subject to unique vulnerabilities that need to be addressed differently than common network vulnerabilities.
White Paper
This white paper dives into collection strategies for inventorying data and the design process and considerations when trying to reduce exposure to unwanted regulatory scrutiny, loss of customer trust, loss of potential business opportunities, and negative press coverage.
Webinar
This webinar explores ways to simplify and accelerate the FedRAMP process through compliance automation techniques. FedRAMP authorization is the key to Cloud Service Providers (CSPs) accessing the enormous Federal market, tapping into new revenue streams, and transforming a strong cybersecurity posture into a powerful market differentiator.
Data Sheet
When defending your organization’s network and systems against vulnerabilities, knowing where to start is critical. Coalfire’s threat and vulnerability management (TVM) program provides you with a programmatic approach to effectively identify, secure, manage, and communicate your security posture.
Webinar
This webinar features of panel comprising some of the industry’s top cloud experts, who discuss their real-world experience and the latest market research to help you navigate your secure cloud deployment—from strategy through to optimization.
White Paper
This is a brief walkthrough of app-specific highlights from our 3rd Annual Penetration Risk Report, that shows how application security matters appear throughout our datasets.
Data Sheet
The number of connected devices has skyrocketed in the past few years thanks
to modern technology. Because of IoT’s rapid evolution, innovative disruptions are
occurring at a staggering pace, especially in the industrial IoT (IIoT) and smart infrastructure, consumer IoT, and medical IoT (IoMT) spaces.