Coalfire

Balancing legal frameworks and enterprise security governance
In this Help Net Security interview, Tom McAndrew, CEO at Coalfire, discusses the balance organizations must strike between legal compliance and effective enterprise security …

Coalfire announces Cyber Security On-Demand portfolio
Coalfire announced its Cyber Security On-Demand portfolio to provide a flexible set of services that reduce cyber risks and remediate security vulnerabilities in customer …

Risk management focus shifts from external to internal exposure
Coalfire released its fourth annual Securealities Penetration Risk Report which analyzes enterprise and cloud service providers (CSPs) internal and external attack vectors, …

NightDragon partners with Coalfire to accelerate portfolio compliance and cybersecurity readiness
NightDragon and Coalfire announced a partnership to advance the maturity of NightDragon’s portfolio companies around key cybersecurity and compliance requirements, …
Coalfire partners with Qualys to further strengthen its cloud automation services
Coalfire, a trusted provider of cybersecurity assessment and advisory services, announced that it has partnered with Qualys, a leading provider of cloud-based security and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility