The Coalfire Blog

Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique cybersecurity issues that impact the industries we serve, including Cloud Service Providers, RetailFinancial Services, Healthcare, Higher Education, Payments, Government, Restaurants, and Utilities.

The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts. We look forward to your comments, so please join the conversation.

  • Funeral Services for Rick Dakin

    June 25, 2015, Communications Team, Coalfire

    The funeral for Rick Dakin will be held on Tuesday, June 30 at 10 a.m. at the Gatehouse (Lionsgate), located at 1055 South 112th Street, (Hwy 287), Lafayette, CO 80026.  Arrangements are being made through the Crist Mortuary in Boulder, Colorado.  An online memorial page and guestbook will be set up shortly where you may sign in and leave messages for the family.

    Read more
  • In Memory of Our Friend, Rick Dakin

    June 22, 2015, Communications Team, Coalfire

    We are deeply saddened to announce that our founder and CEO Rick Dakin passed away suddenly over the weekend.

    Read more
  • Is penetration testing required for HIPAA compliance?

    June 22, 2015, Andrew Hicks, Managing Principal, Coalfire

    In this blog post we’re going to focus our discussion on the technical requirement part of this standard.  The evaluation is supposed to establish the extent to which a covered entity’s (or business associate’s) security policies and procedures meet the requirements of the HIPAA Security Rule.  A question is posed: how does an organization evaluate this requirement without performing specific technical testing?

    Read more
  • P2PE in Higher Education--Reducing Applicable Controls

    June 04, 2015, Tyler Baker, Regional Sales Manager

    Point to Point Encryption (P2PE) is the hottest topic in the PCI world right now and many of our Higher Education clients are anxious to take advantage of the solutions available to them.  However, with 2.0 not yet released, and then the subsequent release of the audit guidelines, there are many questions on how to benefit from a reduction in applicable controls.  This blog post is the result of an interview with Tyler Baker (Regional Sales Manager focused on Higher Education), Mark Lucas (VP over Higher Education Delivery) and Tim Winston (Director over our P2PE practice).

    Read more
  • Final HITECH Act Stage 3 Meaningful Use Rules May Require Annual Risk Analysis plus a Risk Management Component

    June 03, 2015, Andrew Hicks, Managing Principal, Coalfire

    The comments are in and the HHS is scrambling to review them all before they issue the final Stage 3 Meaningful Use rules later this summer.  Comments from entities such as CHIME and HIMSS represent good news and bad news for healthcare providers, depending on how you look at it.  The HIPAA Security Rule has always required a risk analysis, but now there could be an annual requirement for risk analyses.

    Read more

Recent Posts

Post Topics

Archives

Tags

2.0 3.0 access Accounting Agency AICPA Assessment assessments ASV audit AWS AWS Certified Cloud Practitioner AWS Certs AWS Summit bitcoin Black Hat Black Hat 2017 blockchain Blueborne Breach BSides BSidesLV Burp BYOD California Consumer Privacy Act careers CCPA Chertoff cloud CoalfireOne Compliance credit cards C-Store Cyber cyber attacks Cyber Engineering cyber incident Cyber Risk cyber threats cyberchrime cyberinsurance cybersecurity danger Dangers Data DDoS DevOps DFARS DFARS 7012 diacap diarmf Digital Forensics DoD DRG DSS e-banking Ed Education encryption engineering ePHI Equifax Europe EU-US Privacy Shield federal FedRAMP financial services FISMA Foglight forensics Gartner Report GDPR Google Cloud NEXT '18 government GRC hack hacker hacking Halloween Health Healthcare heartbleed Higher Higher Education HIMSS HIPAA HITECH HITRUST HITRUST CSF Horror Incident Response interview IoT ISO IT JAB JSON keylogging Kubernetes Vulnerability labs LAN law firms leadership legal legislation merchant mobile NESA News NH-ISAC NIST NIST 800-171 NIST SP 800-171 NotPetya NRF NYCCR O365 OCR of P2PE PA DSS PA-DSS password passwords Payments PCI PCI DSS penetration Penetration Testing pentesting Petya/NotPetya PHI Phishing Phising policy POODLE PowerShell Presidential Executive Order Privacy program Ransomware Retail Risk RSA RSA 2019 Safe Harbor Scanning Scans scary security security. SOC SOC 2 social social engineering Spectre Splunk Spooky Spraying Attack SSAE State Stories Story test Testing theft Virtualization Visa vulnerability Vulnerability management web Wifi wireless women XSS