The Coalfire blog


Managing Your Vulnerabilities, FedRAMP Style

  • Dana Scaffido

Scripted Inputs and Splunk

  • Josh Porto

Forensically Imaging a Microsoft Surface Pro 4

  • Robert Meekins

Ransomware: the anatomy of paying a ransom to decrypt hostage files

  • Bryce Bearchell

SOC 2 Type 1 and SOC 2 Type 2 Frequently Asked Questions

  • Dixon Wright

FedRAMP High Baseline Requirements Published

  • Abel Sussman

Subscribe to the blog

Subscribe to our RSS feed to receive the latest cybersecurity insights from Coalfire.