Guardians of IoT: Strengthening the security of IoT-connected medical devices in the healthcare industry
The healthcare ecosystem requires stakeholders to have a comprehensive grasp of the industry-specific vulnerabilities, especially in its emerging technology. Coalfire examines key healthcare-specific IoT vulnerabilities, helping healthcare IoT manufacturers and medical facility administrations know what to look for when finding a security vendor ... Read More
The benefits of using the new Data Privacy Framework
After the Schrems II ruling by the Court of Justice of the European Union, legal cross-border transfers of personal data from the EU to the U.S. became a key issue for U.S. businesses. After years of negotiations with the EU, the EU and U.S. have developed and agreed upon an ... Read More
Hexeon unleashed: human-centric offensive security amplified by technology
Part 3 in a blog series spotlighting Coalfire's 5th Annual Penetration Risk Report ... Read More
The great divide of PCI DSS v4.0: Merchants, are you ready?
Are you ready for PCI DSS 4.0? It’s vital to understand the changes to prepare properly and avoid costly delays in achieving compliance ... Read More
Breaking down barriers: Redefining the FedRAMP® journey for cloud service providers
Since the passing of the FedRAMP Authorization Act last December, inquiries about navigating FedRAMP's complex landscape have surged. Recognizing this, Coalfire is pioneering a new pathway to streamline the FedRAMP authorization process, making it more accessible for cloud service providers ... Read More
Guardians of IoT: Safeguarding connectivity of input and output channels
Ensuring the security of the Internet of Things (IoT) demands a meticulous examination of industry-specific vulnerabilities and a profound comprehension of data handling. Have you taken the necessary steps to confirm that your chosen third-party security vendor possesses a comprehensive understanding of the specific requirements concerning your devices, clients, and ... Read More
Cracking the code to compliance management
Based on recent research and findings from Coalfire’s 2023 Compliance Report, the second blog in this series outlines compliance program management and performance priorities for CISOs and compliance leaders ... Read More

Penetration testing: shifting paradigms from reactive to proactive
Part 2 in a blog series spotlighting Coalfire’s 5th Annual Penetration Risk Report ... Read More
A rundown of the OWASP top 10 for large language model applications
As part of the Open Worldwide Application Security Project (OWASP) AI Project, a community of international experts published a list of the top 10 critical vulnerabilities seen in Large Language Model (LLM) applications ... Read More
What to look for in an audit partner
How are successful auditor partnerships formed? It starts with selecting the right auditor and taking them with you on your organization’s compliance journey ... Read More