Guardians of IoT: Strengthening the security of IoT-connected medical devices in the healthcare industry

|
The healthcare ecosystem requires stakeholders to have a comprehensive grasp of the industry-specific vulnerabilities, especially in its emerging technology. Coalfire examines key healthcare-specific IoT vulnerabilities, helping healthcare IoT manufacturers and medical facility administrations know what to look for when finding a security vendor ... Read More

The benefits of using the new Data Privacy Framework

|
After the Schrems II ruling by the Court of Justice of the European Union, legal cross-border transfers of personal data from the EU to the U.S. became a key issue for U.S. businesses. After years of negotiations with the EU, the EU and U.S. have developed and agreed upon an ... Read More

Hexeon unleashed: human-centric offensive security amplified by technology

|
Part 3 in a blog series spotlighting Coalfire's 5th Annual Penetration Risk Report ... Read More

The great divide of PCI DSS v4.0: Merchants, are you ready?

|
Are you ready for PCI DSS 4.0? It’s vital to understand the changes to prepare properly and avoid costly delays in achieving compliance ... Read More

Breaking down barriers: Redefining the FedRAMP® journey for cloud service providers

|
Since the passing of the FedRAMP Authorization Act last December, inquiries about navigating FedRAMP's complex landscape have surged. Recognizing this, Coalfire is pioneering a new pathway to streamline the FedRAMP authorization process, making it more accessible for cloud service providers ... Read More

Guardians of IoT: Safeguarding connectivity of input and output channels

|
Ensuring the security of the Internet of Things (IoT) demands a meticulous examination of industry-specific vulnerabilities and a profound comprehension of data handling. Have you taken the necessary steps to confirm that your chosen third-party security vendor possesses a comprehensive understanding of the specific requirements concerning your devices, clients, and ... Read More

Cracking the code to compliance management

|
Based on recent research and findings from Coalfire’s 2023 Compliance Report, the second blog in this series outlines compliance program management and performance priorities for CISOs and compliance leaders ... Read More
Penetration testing: shifting paradigms from reactive to proactive

Penetration testing: shifting paradigms from reactive to proactive

|
Part 2 in a blog series spotlighting Coalfire’s 5th Annual Penetration Risk Report ... Read More

A rundown of the OWASP top 10 for large language model applications

|
As part of the Open Worldwide Application Security Project (OWASP) AI Project, a community of international experts published a list of the top 10 critical vulnerabilities seen in Large Language Model (LLM) applications ... Read More

What to look for in an audit partner

|
How are successful auditor partnerships formed? It starts with selecting the right auditor and taking them with you on your organization’s compliance journey ... Read More