Resources

Filters

Data Sheet

Snyk Partnership Data Sheet

By partnering with Coalfire® and leveraging Snyk’s powerful tools, clients can build a trusted cybersecurity posture with proactive protection and hacker-driven defenses. This empowers teams to effectively identify and mitigate vulnerabilities, while aligning security strategies with business objectives for sustained resilience against evolving threats.

November 5, 2024

  • Cybersecurity
  • Application security

White Paper

Cybersecurity Program Readiness Checklist

We assembled a checklist that will help you assess your cybersecurity program preparedness and identify where gaps may exist that require strategy adjustments or the expansion of capabilities to address your threat landscape.

August 12, 2024

  • Cybersecurity

White Paper

Generative AI in Cybersecurity

GenAI technology has the potential to enhance cybersecurity, but it also poses a significant threat in the hands of cybercriminals. The development and effectiveness of GenAI in assisting cyber adversaries, including lowering the skill level for cyber criminal activities and facilitating other malicious activities, are discussed. The risks associated with advanced artificial intelligence (AI) and the need for responsible scaling policies (RSPs) to mitigate those risks are also explored. The importance of hardening security postures to prevent theft of model weights is emphasized.

July 18, 2024

  • Cybersecurity

White Paper

Responsible AI

AI risks, such as the spread of misinformation, data privacy concerns, and psychological impact can produce direct harm and have negative, unintended consequences for individuals, populations, and societies. Solving these issues requires new thinking in AI risk management.

April 23, 2024

  • Cybersecurity

Video

Adversarial AI: Navigating the Cybersecurity Landscape

Coalfire’s Red Team Operations Leader, Pete Deros, discusses generative AI and Large Language Models (LLMs), how adversaries are using these tools for effective ransomware scenarios, realistic-sounding phishing campaigns, and even writing malware and code to wreak network havoc in minutes.

November 10, 2023

  • Cybersecurity