The Coalfire Blog

Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique cybersecurity issues that impact the industries we serve, including Cloud Service Providers, RetailFinancial Services, Healthcare, Higher Education, Payments, Government.

The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts.


  • A strategy for cybersecurity strategy

    John Hellickson, CxO Advisor, Coalfire

    Let's start with an assumption:  Having a cybersecurity strategy is best practice.  So, what makes a good cybersecurity strategy?  You'd be surprised how this answer varies across the security industry, especially from seasoned CISOs of Fortune 500 companies.

    Read more
  • New HC3 report defines security assessments needed for healthcare organizations during and after COVID-19

    Rich Curtiss, Director, Healthcare Cyber Risk Services, Coalfire

    The Health Sector Cybersecurity Coordination Center (HC3) recently delivered a report that defines and articulates the security assessments and information technology audits that should be considered during and after the COVID-19 pandemic.

    Read more
  • Headless, Unattended Scanning in Burp Suite Professional 2.0 with Seltzer

    Gabriel Merritt, Senior Security Consultant, Coalfire Labs

    Burp Suite Professional (Burp) is one of the best tools available for penetration testers. It is feature-rich, intuitive, well-supported, and customizable. However, it can be difficult to use Burp for headless, unattended scanning. Alternatives such as Burp Suite Enterprise exist, but those of us with Burp Suite Professional may want to leverage it to perform this type of work. For years, my tool of choice for this has been the Burp extension Carbonator. Available in the BApp Store, Carbonator provides a means to interact with Burp via the command line, scanning a target and exporting the results as HTML. It is a great extension that has worked well, until the release of Burp 2.0.

    Read more
  • A new way to manage supply chain risk – Introducing the AICPA SOC for Supply Chain report

    Jeff Cook, SOC Director, Coalfire

    With the continuation of its System and Organization Controls (SOC) suite of services (SOC 2®, SOC for Cybersecurity, etc.), the American Institute of Certified Public Accountants (AICPA) has released a new report format that focuses on manufacturing and distribution supply chains. The AICPA’s SOC for Supply Chain framework helps these organizations communicate their processes and controls to support their supply chain risk management, as well as to detect, prevent, and respond to supply chain risks. Organizations can also use SOC for Supply Chain reports to help understand and manage their external risks (including cybersecurity) that are typically related to their vendor or distribution networks.

    Read more
  • Establishing risk appetite is key to effective risk management

    Mandy Pote, Director, Cyber Risk Services, Coalfire

    The mission of an enterprise risk management program is to respond to and monitor risks to the enterprise’s operations and objectives. In order to properly respond to and monitor risks, the enterprise must establish risk appetite thresholds. Well-established and well-communicated risk appetite thresholds will ensure that risks are mitigated consistently at all levels of the organization.

    Read more
  • Displaying results 36-40 (of 136)
     |<  <  4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13  >  >| 

Recent Posts

Post Topics

Archives

Tags

Top