The Coalfire blog

Latest

Threat and vulnerability management

Penetration testing: shifting paradigms from reactive to proactive

  • Adam Kerns

3 min read

Application security

A rundown of the OWASP top 10 for large language model applications

  • Priyadharshini Parthasarathy

4 min read

Compliance

What to look for in an audit partner

  • Kylene Bowman

4 min read

Threat and vulnerability management

Looking back at Black Hat 2023

  • Pete Deros

3 min read

Threat and vulnerability management

Behind the eight-ball: Why companies struggle with penetration risk

  • Adam Kerns

3 min read

Strategy, privacy, and risk

How the CISO drives value across the enterprise

  • Michael Eisenberg

2 min read