Resources

Filters

Data Sheet

Secure Code Review

Equipping you with the proactive insight required to prevent production-based reactions.

  • Application security

Data Sheet

Digital Forensics and Incident Response (DFIR)

Phones, tablets, computers, and cloud storage have become integral parts of the lives of billions of people worldwide. These electronic products have digital footprints that aid investigators in recovering from compromises, solving crimes, providing intelligence, and bringing criminals to justice.

  • Cybersecurity
  • Compliance

Data Sheet

ThreadFix Vulnerability Management Platform

The industry’s leading vulnerability management platform, ThreadFix provides a complete view of your risk from applications and their supporting infrastructure.

  • Application security
  • ThreadFix

Data Sheet

Privacy Advisory and Assessment Services

A solid privacy program is no longer just a compliance question – it’s a competitive requirement. Going forward, the question of privacy cannot be answered with a simple privacy policy and contract language.

  • Cyber Risk Advisory

Data Sheet

Secure CI/CD

Coalfire’s Secure CI/CD methodology helps you strategically evaluate, develop, and mature your secure software development program within your DevOps model.

  • Cloud

Data Sheet

Ransomware Readiness Assessment

Ransomware attacks are on the rise. In 2020, the number of attacks worldwide increased by 485% year over year. Because recovering from a ransomware attack can be a costly, time-consuming process that hinders an organization’s ability to conduct normal business, you need to take steps now to properly protect yourself.

  • Cyber Risk Advisory

Data Sheet

Threat and Vulnerability Management

When defending your organization’s network and systems against vulnerabilities, knowing where to start is critical. Coalfire’s threat and vulnerability management (TVM) program provides you with a programmatic approach to effectively identify, secure, manage, and communicate your security posture.

  • Cybersecurity

Data Sheet

Internet of Things Product Security

The number of connected devices has skyrocketed in the past few years thanks to modern technology. Because of IoT’s rapid evolution, innovative disruptions are occurring at a staggering pace, especially in the industrial IoT (IIoT) and smart infrastructure, consumer IoT, and medical IoT (IoMT) spaces.

  • Application security

Data Sheet

PCI in the Cloud

Cloud computing is not a new paradigm, and yet, there is still uncertainty around how the cloud affects PCI compliance for cloud service providers (CSPs), payment service providers, and merchants.

  • Compliance