The Coalfire Blog

Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique cybersecurity issues that impact the industries we serve, including Cloud Service Providers, RetailFinancial Services, Healthcare, Higher Education, Payments, Government.

The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts.


  • Surprises Ahead for Some Level 2 Merchants

    ,

    Read more
  • [CMSAbstractTransformation.DataBind]: Object reference not set to an instance of an object.
  • Mobile Banking Malware: Protect Your Finances

    Mark Lucas, Vice President, Chief Information Security Officer, Coalfire

    The prolific rise in smartphones, tablets and other portable devices has greatly expanded the ways in which we interact with personal and professional services. The public can now singlehandedly use their mobile device to pay for things with the ease of flashing their cell phone. Unfortunately, this rapid expansion of convenience and service also expands the threats.

    Read more
  • What We Learned at HIMSS12

    Andrew Hicks, Managing Principal, Coalfire

    A few weeks ago, more than 35,000 healthcare IT professionals and 1,100 exhibitors converged on Las Vegas.  Some were there to go shopping for “HIT” or health information technology; others were there to sell it.  The IT professionals from across the healthcare spectrum were there to meet with each other and regulators, and stay abreast of the rapid technological changes in the healthcare industry.  This was an overwhelming event; a flood of information.  It’s been a couple of weeks.  Here’s a few of the HIMSS12 highlights:

    Read more
  • RSA 2012: Mobile, Cloud, and Intelligent Control

    Rick Norman, Director, Professional Services

    It was good to catch up with our customers and partners at RSA 2012 this week. Much of the buzz this year was around mobile devices and securing the cloud. We were glad to see innovative organizations introducing compliance-validated architectures based on these emerging technologies. One such organization was Hewlett-Packard, a Coalfire client and business partner. 

    Read more
  • The Budding Healthcare IT Spring

    Rick Dakin, CEO, Co-founder and Chief Security Strategist

    HIMSS12 is in full production in Las Vegas this week. Over 40,000 healthcare IT professionals and service providers have descended upon a conference that will set the direction for a new wave to technology innovations for the healthcare industry. Almost every booth has a sign that extolls the benefits of cloud-based services delivered through mobile devices. The promise to shake the industry to its core is a common theme.

    Read more
  • Displaying results 381-385 (of 418)
     |<  <  73 - 74 - 75 - 76 - 77 - 78 - 79 - 80 - 81 - 82  >  >| 

Recent Posts

Post Topics

Archives

Tags

Accounting Agency AICPA Assessment assessments ASV audit AWS AWS Certified Cloud Practitioner AWS Certs AWS Summit bitcoin Black Hat Black Hat 2017 blockchain Blueborne Breach BSides BSidesLV Burp BYOD California Consumer Privacy Act careers CCPA Chertoff CISO cloud CMMC CoalfireOne Compliance Covid-19 credit cards C-Store Culture Cyber cyber attacks Cyber Engineering cyber incident Cyber Risk cyber threats cyberchrime cyberinsurance cybersecurity danger Dangers Data DDoS DevOps DevSecOps DFARS DFARS 7012 diacap diarmf Digital Forensics DoD DRG DSS e-banking Education encryption engineering ePHI Equifax Europe EU-US Privacy Shield federal FedRAMP financial services FISMA Foglight forensics Gartner Report GDPR Google Cloud NEXT '18 government GRC hack hacker hacking Halloween Health Healthcare heartbleed Higher Education HIMSS HIPAA HITECH HITRUST HITRUST CSF Horror Incident Response interview IoT ISO IT JAB JSON keylogging Kubernetes Vulnerability labs LAN law firms leadership legal legislation merchant mobile NESA News NH-ISAC NIST NIST 800-171 NIST SP 800-171 NotPetya NRF NYCCR O365 OCR of P2PE PA DSS PA-DSS password passwords Payments PCI PCI DSS penetration Penetration Testing pentesting Petya/NotPetya PHI Phishing Phising policy POODLE PowerShell Presidential Executive Order Privacy program Ransomware Retail Risk RSA RSA 2019 Safe Harbor Scanning Scans scary security security. SOC SOC 2 social social engineering Spectre Splunk Spooky Spraying Attack SSAE State Stories Story test Testing theft Virtualization Visa vulnerability Vulnerability management web Wifi women XSS
Top