The Coalfire blog

Latest

Compliance

Cybersecurity Risk Management – From HIPAA to HITRUST

  • Rich Curtiss

4 min read

Cloud

Cloud Transformation and the Shared Security Model

  • Sean Cyriaque

2 min read

Threat and vulnerability management

The Basics of Exploit Development 3: Egg Hunters

  • Andy Bowden

12 min read

Strategy, privacy, and risk

What to Expect When You are Expecting… Your CISO to Leave

  • Kurt Manske

4 min read

Threat and vulnerability management

Part Two: Reverse Engineering and Patching with Ghidra

  • Dan McInerney

8 min read

ThreadFix

Applied ThreadFix: Security Teams Collaborating with Development Teams

  • Dan Cornell

5 min read

Subscribe to the blog

Subscribe to our RSS feed to receive the latest cybersecurity insights from Coalfire.