The Coalfire Blog

Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique cybersecurity issues that impact the industries we serve, including Cloud Service Providers, RetailFinancial Services, Healthcare, Higher Education, Payments, Government.

The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts.


  • Cloud Transformation and the Shared Security Model

    Sean Cyriaque, Senior Consultant, Cyber Risk Advisory, Coalfire

    For many organizations, the lure of the cloud is very strong. Large enterprises usually have several justifications for adopting cloud-based services including preserving capital, adding scalability to applications, and minimizing IT staffing needs. Small- to medium-sized organizations often look at the cloud as an avenue to achieve all those same goals without the need for improved security skills from their existing IT staff. But as the number and sophistication of attacks in the cloud grow exponentially, there is increasing confusion regarding who is responsible for the security and compliance of applications and data in the cloud.

    Read more
  • The Basics of Exploit Development 3: Egg Hunters

    Andy Bowden, Consultant, Coalfire Labs

    Hello dear reader. If you have read the other articles in this series, welcome back!  If not I encourage you to read the previous installments before proceeding with this post. This post covers a surprisingly useful technique in exploit development called Egg Hunters. In order to demonstrate how Egg Hunters function, we will write an exploit for a 32 bit Windows application vulnerable to a SEH overflow. However, due to how the application handles input, we will be required to use an Egg Hunter to locate our payload in memory move execution to it.

    Read more
  • What to Expect When You are Expecting… Your CISO to Leave

    Kurt Manske, Director, Cyber Risk Advisory, Coalfire

    “The CISO is leaving the company. What are the next steps?”

    No executive likes to hear that a key member of the business is leaving the organization. Turnover among key business leaders isn’t unusual, but as a factual matter, CISO average tenure is relatively short – approximately 24 to 48 months.

    Read more
  • Part Two: Reverse Engineering and Patching with Ghidra

    Dan McInerney, Senior Security Consultant, Coalfire

    In the first installment of our three-part blog series we learned how to root the Flashforge Finder 3D printer and acquire its firmware. In this post, we will delve into reverse engineering and patching the software using the new open source NSA tool Ghidra, which rivals its expensive competitors such as IDA Pro in value and ease of use.

    Read more
  • So Your Company has decided to do FedRAMP - What does that mean?

    Nick Peters, Senior Manager, FedRAMP Assurance Services, Coalfire

    The exponential increase in cloud adoption in recent years has led to a dramatic increase in technology companies evolving from software and application companies to Software as a Service (SaaS), Platform as a Service (PaaS) or Infrastructure as a Service (IaaS) providers. The 2011 release of the Cloud First Initiative in the Federal government launched the Federal Risk and Authorization Management Program (FedRAMP). To sell cloud services to the Federal government, FedRAMP requires Cloud Service Providers (CSPs) to have their multi-tenant Cloud Service Offering (CSO) assessed and authorized, and then they must maintain compliance via continuous monitoring and annual assessments.

    Read more
  • Displaying results 46-50 (of 136)
     |<  <  6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15  >  >| 

Recent Posts

Post Topics

Archives

Tags

Top