The Coalfire blog

Latest

Compliance

The HITRUST Common Security Framework: Not Just for Healthcare Anymore

  • Andrew Barratt
Threat and vulnerability management

Introducing Slackor, a Remote Access Tool Using Slack as a C2 Channel

  • Esteban Rodriguez
Threat and vulnerability management

Fuzzing: Common Tools and Techniques

  • Andy Bowden
Threat and vulnerability management

pymetasploit3 – Metasploit Automation Library

  • Dan McInerney
Strategy, privacy, and risk

Is Cloud Computing Really New? And Other Insights on the Changing Face of Cloud

  • Kurt Hagerman
Strategy, privacy, and risk

A Day in the Life of a Cybersecurity Professional

  • Sohaib Adil