Coalfire
Close
  • Home
  • Toggle Solutions
    • Toggle Compliance services
      • ISO
      • HITRUST
      • PCI DSS
      • StateRAMP
      • SOC and attestations
      • CMMC
      • FISMA
      • HIPAA
      • Cyber performance review
      • DEA EPCS
      • DoD RMF
      • FFIEC
      • ITAR and EAR
      • Market development services
      • NIST SP 800-171
      • P2PE
      • PA-DSS/SSF
      • Product applicability guides
      • PCI Forensic Investigator
      • PCI in the cloud
      • Reports on compliance
      • White paper services
      • View more >
    • FedRAMP®
    • Penetration testing
    • Toggle Cloud security
      • Accelerated Cloud Engineering
      • Cloud security maturity
      • Secure CI/CD
    • Managed services
    • Toggle Application security
      • Web application perimeter mapping
      • Secure code review
      • Program development and implementation
      • Instructor-led AppSec training
      • Security assessments
      • ThreadFix
      • Developer champion services
      • Application threat modeling
      • View more >
    • Toggle Vulnerability management
      • Attack surface management
      • Red team exercise
      • Threat modeling and attack simulation
      • Vulnerability assessment
    • Toggle Strategy, privacy, and risk
      • Strategy+ cybersecurity program assessment
      • CISO program management
      • Data privacy program development services
      • Cyber risk assessment
      • Third party risk management
      • M&A cyber due diligence
      • Healthcare security risk analysis and advisory
      • Cyber breach services
      • View more >
  • Toggle Industries
    • Cloud service providers
    • Federal government
    • Financial services
    • Healthcare
    • Higher education
    • Hospitality
    • Retail
    • State & local government
    • Technology
    • Utilities
  • Toggle Insights
    • Blog
    • Resources
    • News and events
    • Press Releases
  • Careers
  • Toggle About
    • Company overview
    • Board Advisors and Directors
    • Diversity and inclusion
    • Executive Team
    • Partners
    • Richard E. Dakin Fund
    • Research and development
  • Contact
Toggle navigation
  1. Home
  2. Solutions
  3. Vulnerability management
  4. protips testing applications using burp and more

Attack surface management

Red team exercise

Threat modeling and attack simulation

Vulnerability assessment

Recent Posts

  • Cloud tech first floor recommendations
  • IoT Part 3: Fire!
  • Am I doing it right? An introspective look at "why it's like this"
  • The Basics of Exploit Development 3: Egg Hunters
  • Part Two: Reverse Engineering and Patching with Ghidra

Tags

CISO cloud IoT JSON labs NIST Penetration Testing PowerShell Ransomware Risk Testing
Solutions
  • Compliance services
  • FedRAMP®
  • Penetration testing
  • Cloud security
  • Managed services
  • Application security
  • Vulnerability management
  • Strategy, privacy, and risk

Industries
About
  • Company overview
  • Board Advisors and Directors
  • Diversity and inclusion
  • Executive Team
  • Richard E. Dakin Fund
  • Partners
  • Research and development
Insights
  • Blog
  • Resources
  • News and events

Market development services
Careers Contact us

Under attack? Take immediate action with our digital forensics services.

  • USA/CAN: (877) 224-8077
  • FEDERAL: (703) 760-3801
  • UK/EMEA: +44 161 537 1280

Copyright © Coalfire. All Rights Reserved. Privacy Policy Legal

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
CoalfireOne login
  • Solutions
    • Compliance services
    • FedRAMP®
    • Penetration testing
    • Cloud security
    • Managed services
    • Application security
    • Vulnerability management
    • Strategy, privacy, and risk
    {%DocumentName%} Image

    Move forward, faster with solutions that span the entire cybersecurity lifecycle. Our experts help you develop a business-aligned strategy, build and operate an effective program, assess its effectiveness, and validate compliance with applicable regulations.

    • ISO

      Build a management system that complies with ISO standards

    • HITRUST

      Receive guidance from an original HITRUST CSF Assessor firm

    • PCI DSS

      Protect cardholder data from cyber attacks and breaches

    • StateRAMP

      Expert guidance and advisory services for CSPs that want to achieve StateRAMP authorization

    • SOC and attestations

      Maintain trust and confidence across your organization’s security and financial controls

    • CMMC

      Navigate your path to Cybersecurity Maturity Model Certification

    View more >
    FedRAMP® Image

    Get advisory and assessment services from the leading 3PAO.

    Penetration testing Image

    Discover and remediate critical vulnerabilities before they’re exploited.

    • Accelerated Cloud Engineering

      Streamline cloud development with compliant-ready environments

    • Cloud security maturity

      Adopt our cloud security model as a safeguard

    • Secure CI/CD

      Successfully incorporate security into your DevOps program

    Managed services Image

    Get immediate insights and continuous monitoring. Because real time beats point-in-time - every time.

    • Web application perimeter mapping

      Providing you critical visibility and actionable insight into the risk of your organization’s entire external web application perimeter

    • Secure code review

      Equipping you with the proactive insight required to prevent production-based reactions

    • Program development and implementation

      Giving you the ability to drive successful application security implementations across development, security, and operations

    • Instructor-led AppSec training

      Build baseline application security fundamentals inside your development teams with additional education and training resources

    • Security assessments

      Comprehensive testing and assessment of modern, legacy, hybrid, and mobile applications and IoT devices

    • ThreadFix

      Spend less time manually correlating results and more time addressing security risks and vulnerabilities.

    View more >
    • Attack surface management

      Providing you unparalleled visibility into your security posture

    • Red team exercise

      Boost your defenses by simulating a real-world attack

    • Threat modeling and attack simulation

      Maximize security investments and prove their effectiveness

    • Vulnerability assessment

      Strengthen your risk and compliance postures with a proactive approach to security

    • Strategy+ cybersecurity program assessment

      Drive business success through cybersecurity strategy

    • CISO program management

      Strengthen your program by putting our experts to work

    • Data privacy program development services

      Turn privacy into a competitive advantage

    • Cyber risk assessment

      Uncover the risks present in your organization

    • Third party risk management

      Hold vendors and partners to your security standards

    • M&A cyber due diligence

      Know what risks you’re facing with a merger or acquisition

    View more >
  • Industries
    • Cloud service providers
    • Federal government
    • Financial services
    • Healthcare
    • Higher education
    • Hospitality
    • Retail
    • State & local government
    • Technology
    • Utilities
    {%DocumentName%} Image

    While cybersecurity is a priority for enterprises worldwide, requirements differ greatly from one industry to the next. Coalfire understands industry nuances; we work with leading organizations in the cloud and technology, financial services, government, healthcare, and retail markets.

    Cloud service providers Image

    Coalfire can help cloud service providers prioritize the cyber risks to the company, and find the right cyber risk management and compliance efforts that keeps customer data secure, and helps differentiate products.

    Federal government Image

    "Success" at a government entity looks different at a commercial organization. Create cybersecurity solutions to support your mission goals with a team that understands your unique requirements.

    Financial services Image

    The financial services industry was built upon security and privacy. As cyber-attacks become more sophisticated, a strong vault and a guard at the door won’t offer any protection against phishing, DDoS attacks and IT infrastructure breaches.

    Healthcare Image

    The continuum of care is a concept involving an integrated system of care that guides and tracks patients over time through a comprehensive array of health services spanning all levels of care. Interoperability is the central idea to this care continuum making it possible to have the right information at the right time for the right people to make the right decisions.

    Higher education Image

    Maintaining network and data security in any large organization is a major challenge for information systems departments. However, in the higher education environment, the protection of IT assets and sensitive information must be balanced with the need for ‘openness’ and academic freedom; making this a more difficult and complex task.

    Hospitality Image

    When it comes to cyber threats, the hospitality industry is not a friendly place. Hotels and resorts have proven to be a favorite target for cyber criminals who are looking for high transaction volume, large databases and low barriers to entry.

    Retail Image

    The global retail industry has become the top target for cyber terrorists, and the impact of this onslaught has been staggering to merchants. To secure the complex IT infrastructure of a retail environment, merchants must embrace enterprise-wide cyber risk management practices that reduces risk, minimizes costs and provides security to their customers and their bottom line.

    State & local government Image

    Private enterprises serving government and state agencies need to be upheld to the same information management practices and standards as the organizations they serve. Coalfire has over 16 years of experience helping companies navigate increasing complex governance and risk standards for public institutions and their IT vendors.

    Technology Image

    Technology innovations are enabling new methods for corporations and governments to operate and driving changes in consumer behavior. The companies delivering these technology products are facilitating business transformation that provides new operating models, increased efficiency and engagement with consumers as businesses seek a competitive advantage.

    Utilities Image

    Cybersecurity has entered the list of the top five concerns for U.S. electric utilities, and with good reason. According to the Department of Homeland Security, attacks on the utilities industry are rising "at an alarming rate".

  • Insights
    • Blog
    • Resources
    • News and events
    • Press Releases
    {%DocumentName%} Image

    Get valuable insight into what matters most in cybersecurity, cloud, and compliance. Here you’ll find resources – including research reports, white papers, case studies, the Coalfire blog, and more – along with recent Coalfire news and upcoming events.

    Blog Image

    Written by Coalfire's leadership team and our security experts, the Coalfire Blog covers the most important issues in cloud security, cybersecurity, and compliance.

    Resources Image

    Find information that can help you approach cybersecurity programmatically. Explore our research reports, white papers, on-demand webinars, videos, case studies, and more.

    News and events Image

    Stay up-to-date with all things Coalfire. Find upcoming events and webinars. See what’s new with your cybersecurity partner. And read the latest media coverage.

    Press Releases Image

    Cybersecurity never stands still - and neither do we. Read the latest announcements and press releases from Coalfire.

  • Careers
    {%DocumentName%} Image

  • About
    • Company overview
    • Board Advisors and Directors
    • Diversity and inclusion
    • Executive Team
    • Partners
    • Richard E. Dakin Fund
    • Research and development
    {%DocumentName%} Image

    Since 2001, Coalfire has worked at the cutting edge of technology to help public and private sector organizations solve their toughest cybersecurity problems and fuel their overall success.

    Company overview Image

    Coalfire helps organizations comply with global financial, government, industry and healthcare mandates while helping build the IT infrastructure and security systems that will protect their business from security breaches and data theft. The company is a leading provider of IT advisory services for security in retail, payments, healthcare, financial services, higher education, hospitality, government and utilities.

    Board Advisors and Directors Image

    The Coalfire Board of Directors provides invaluable guidance for the organization and reflects Coalfire’s dedication to achieving success for our customers.

    Diversity and inclusion Image

    Coalfire is committed to creating a culture that fosters diversity, inclusion, belonging, and equity.

    Executive Team Image

    Coalfire’s executive leadership team comprises some of the most knowledgeable professionals in cybersecurity, representing many decades of experience leading and developing teams to outperform in meeting the security challenges of commercial and government clients. With diverse backgrounds in IT systems security, governmental security, compliance, and reducing risk while implementing the latest enabling technologies (such as the Cloud and IoT), our leaders understand the challenges customers face.

    Partners Image

    Security is a team game. If your organization values both independence and security, perhaps we should become partners.

    Richard E. Dakin Fund Image

    Created in honor of the late co-founder of Coalfire, the Richard E. Dakin Fund at The Denver Foundation is supporting scholarship programs at several universities for promising college students studying cybersecurity and related fields.

    Research and development Image

    The Coalfire Research and Development (R&D) team creates cutting-edge, open-source security tools that provide our clients with more realistic adversary simulations and advance operational tradecraft for the security industry.

  • Contact
    • Locations
    {%DocumentName%} Image

Close