• Forensically Imaging a Microsoft Surface Pro 4

    August 29, 2017, Robert Meekins, Director, Forensics, Coalfire

    Working on digital forensics can sometimes create some challenging situations. Recently, we received a couple of Microsoft Surface Pro tablets to image and analyze. Having conducted forensics for a while, I realized that, depending on the version, imaging this tablet could be a challenge. Some setbacks normally associated with Surface tablets include not being able to remove the hard drive, the inability to place the device in target mode, and the hardware being very finicky about what OS can and cannot boot. Ultimately, the challenge comes down to having to use the tablet itself to perform the image, and the only option for input is a single USB port.

    Read more
  • FedRAMP JAB Business Case extended

    August 22, 2017, Abel Sussman, Senior Project Manager, Commercial Services, Coalfire

    The FedRAMP Business Case for being considered for this cycle of the Joint Authorization Board (JAB) has been pushed out to August 31 at 5:00pm eastern. The additional time is to accommodate the large number of requests to document demand verification. Earlier the JAB has stated that federal demand across the U.S. government is the primary selection criteria for cloud service providers to be selected. This demand can be shown in current customers, on premise customers interested in a cloud offering, and potential customers documented through RFI/RFPs.

    Read more
  • Coalfire’s Adaptive Penetration Testing at Black Hat Helped Prepare Tomorrow’s Security Talent

    August 16, 2017, Ryan MacDougall, Sr. Security Consultant

    What makes a penetration tester highly successful? Most obviously, the technical skills to hack into a network, application, or location comes to mind first, and without those capabilities and the ability to continuously learn, an aspiring pen tester has a tough road ahead of them.

    Read more
  • SOC 2 Criteria: Change Is Coming - And You Can Have a Voice

    August 07, 2017, Jeff Cook, Principal, SOC Practice, Coalfire

    SOC 2 reports are an important tool service providers use to give their customers assurances about their service’s security, compliance, privacy, availability, confidentiality and processing integrity by providing details about the service and the related controls that are in place. SOC 2 examinations are conducted by independent CPA firms such as Coalfire Controls, LLC and other credible firms. Periodically, the American Institute of CPAs (AICPA) reviews the standardized criteria used in a SOC 2 examination and makes updates to keep the process relevant and assure it is providing stringent measures for customer organizations’ peace of mind.

    Read more
  • Black Hat 2017: training, cybersecurity trends and end-point protection

    August 03, 2017, Marshall England, Sr. Marketing Director, Technology & Cloud

    Every year, Black Hat is a highly anticipated event in the cybersecurity community—and Black Hat 2017 certainly did not disappoint! It was yet another year of record traffic, bustling with visitors from the security community that want to strengthen their security skills and postures. Organizations in the midst of digital transformations and digital native businesses alike sent security teams to learn about various tools and techniques to increase their knowledge of defense and breach prevention.

    Read more

Recent Posts

Post Topics

Archives

Tags