The Coalfire Blog

Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique cybersecurity issues that impact the industries we serve, including Cloud Service Providers, RetailFinancial Services, Healthcare, Higher Education, Payments, Government, Restaurants, and Utilities.

The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts. We look forward to your comments, so please join the conversation.


  • Capital One Fraud Seminar Recap

    October 26, 2017, Michael Pitcher, Vice President, Cyber Engineering, Coalfire

    Recently, I was honored to be invited as a panelist at a recent seminar hosted by Capital One Spark Business to share some views on fraud prevention and cybersecurity with their customers. I was joined by a few other industry experts, Gerald Glickman, a Manager of Capital One’s Fraud Analysis team, and Jennifer Smith, who led the Cybersecurity and Data Privacy group at the Shulman, Rogers, Gandal, Pordy & Ecker law firm, to round out a diverse group from various parts of the industry. Each of us deal with fraud daily, but we have very different roles: Jennifer on the litigation side, Gerald from inside a bank, and myself from the technical perspective. Read more
  • Scripted Inputs and Splunk

    October 19, 2017, Josh Porto, Senior Consultant, Cyber Engineering, Coalfire

    Splunk is an extremely versatile tool when dealing with data:

    - Monitor files?  Check!

    - Listen in on an open port?  Check!

    - Monitor the file system? Performance monitor?  HTTP Event Collector?

    - Check, check aaaaand check!

    But what if the data you want to ingest does not have a method listed above? Say, something like a database or a security tool’s API? Scripted inputs are the solution! Splunk can even employ a variety of scripts to include (but not limited to) PowerShell, shell scripts, and Python.  Besides working around data sources, which do not use log files and cannot send via TCP or UDP, the advantages abound and include:

    Read more
  • Top 10 Things CSPs Need to Know about FedRAMP Authorization on Amazon Web Services

    October 18, 2017, Jennifer Tonisson, Partner Marketing Manager, Technology & Cloud, Coalfire

    Coalfire conducted a webinar, FedRAMP on AWS: What you need to know. The discussion covered what cloud service providers need to know when pursuing FedRAMP authorization leveraging AWS U.S East/West or GovCloud. Below you’ll find the Top 10 things that cloud service providers should know.

    Read more
  • An Analysis of PCI DSS Requirement 11.3.4.1 and the Compliance Expectations

    October 13, 2017, Jason Pieters, Product Director, PCI, Coalfire

    For some organizations, understanding, navigating, and complying with the Payment Card Industry (PCI) Data Security Standard (DSS), especially after the release of the latest version (v3.2) released in April 2016, has become confusing and/or challenging because of the inclusion of phased-in applicability of requirements. The most common questions that Coalfire receives from clients are regarding requirement 11.3.4.1

    Read more
  • Blockchain: Are You Ready?

    October 06, 2017, Mitch Ross, Senior Consultant, Cyber Engineering, Coalfire

    By now, most of us have heard of Bitcoin. Few of us really know the specifics about what that is. Fewer still have a workable (or even cursory) knowledge of the underlying technology that makes Bitcoin possible.

    Read more
  • Displaying results 11-15 (of 259)
     |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >| 

Recent Posts

Post Topics

Archives

RSS Feed

The Coalfire BlogSubscribe to Feed
Chrome users will need to install RSS Subscription Extension (by Google)

Tags