![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
ThreadFix®
![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
![Blog Images 2022 08 17 Tile](/assets/imager/images/27872/Blog-Images-2022-08_17_Tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27872/Blog-Images-2022-08_17_Tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27872/Blog-Images-2022-08_17_Tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
Cybersecurity
Chasing Doorbells: Finding IoT Vulnerabilities in Embedded Devices
8 min read
Read more
![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
Application security
Please Stop Managing Vulnerabilities in Excel Spreadsheets
4 min read
Read more
![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
Application security
What’s in a Name? – Why Gartner Picking “Application Vulnerability Correlation” is an Important Step for the Application Security Market
5 min read
Read more
![Blog Images 2022 06 26 Tile](/assets/imager/images/27806/Blog-Images-2022-06_26_Tile_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27806/Blog-Images-2022-06_26_Tile_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27806/Blog-Images-2022-06_26_Tile_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)
![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
![Blog Images 2022 TF Coalfire logo grey](/assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_3f81fc6303236aeedf0885f73bd747c3.png 200w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_2a1fd2b9f08921476dd482120a4627cc.png 400w, /assets/imager/images/28300/Blog-Images-2022-TF_Coalfire_logo_grey_ab829ea53212f9b25775984a19e3b3e7.png 560w)
Application security
Managing Vulnerabilities Introduced from Open Source Code Libraries
1 min read
Read more
![Blog Images 2022 04 30 Tile 1](/assets/imager/images/27686/Blog-Images-2022-04_30_Tile_1_3f81fc6303236aeedf0885f73bd747c3.jpg 200w, /assets/imager/images/27686/Blog-Images-2022-04_30_Tile_1_2a1fd2b9f08921476dd482120a4627cc.jpg 400w, /assets/imager/images/27686/Blog-Images-2022-04_30_Tile_1_ab829ea53212f9b25775984a19e3b3e7.jpg 560w)