The Coalfire Blog

Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique cybersecurity issues that impact the industries we serve, including Cloud Service Providers, RetailFinancial Services, Healthcare, Higher Education, Payments, Government, Restaurants, and Utilities.

The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts. We look forward to your comments, so please join the conversation.

  • Social Engineering- Beyond the Baseline

    December 15, 2014, Brandon Edmunds, Senior Security Consultant, Coalfire Labs

    Coalfire Labs does a lot of Social Engineering testing. Traditional Social Engineering testing involves a mundane process of taking a sample of a population and then attacking those “targets” with some pretext calls or a phishing email in order to obtain credentials. Metrics are recorded and then reported back in some form of a deliverable, usually a report. As an example, in a standard Social Engineering engagement, we had a Pretext Calling campaign that included a target selection of 10 users. We made 10 phone calls and talked three of the targeted people out of their passwords.

    Read more
  • Law Firm - Forensics Services

    December 11, 2014, Jennifer Velnoskey, Regional Sales Director

    As cyber threats and attacks have increased year over year, Coalfire has seen a drastic increased need for support to law firms in cybersecurity cases.  Attacks and threats vary so often, many law firms lack the skills required to properly evaluate cyber-attacks involving their clients. As such law firms across the nation are looking to partner with skilled cybersecurity companies to provide expert testimony, litigation consulting, and support related to cases involving cyber-attacks.

    Read more
  • Top 10 Cybersecurity Predictions for 2015

    December 09, 2014, Rick Dakin, CEO, Co-founder and Chief Security Strategist

    Fueled by cybercrime, cyber warfare, and cyber terrorism, the cost of cybersecurity and risk management will double in 2015. That’s the bad news. The good news is there will be a shift to cyber offense that will begin to stem the tide of cyber threats.

    Read more

Recent Posts

Post Topics

Archives

RSS Feed

The Coalfire BlogSubscribe to Feed
Chrome users will need to install RSS Subscription Extension (by Google)

Tags