All Research Sponsored By:Coalfire

Common Risk Profiles for Software and Physical Supply Chains
WEBCAST: Ensuring that your software supply chains are secure is one of the top security considerations your organization should prioritize. This webinar, Common Risk Profiles for Software and Physical Supply Chains, features cybersecurity experts as they shed light on how your business should protect your software supply chains. Tune in here.
Posted: 08 Nov 2022 | Premiered: Nov 8, 2022

TOPICS:  .NET

The Impact of Penetration Testing on Organizational Cybersecurity Posture
WEBCAST: There’s no way to know how your security will perform in the face of an attack, until it is attacked. This doesn’t mean you should wait on cybercriminals to know if your security is effective. This webcast presents an analysis of the effects of penetration testing, looking at how organizations are testing for vulnerabilities. Read on to learn more.
Posted: 08 Nov 2022 | Premiered: Nov 8, 2022

TOPICS:  .NET

Preparing for PCI 4.0 – big changes you need to know now
WHITE PAPER: One of the most impactful assurance programs – affecting most businesses, consumers, and supply chains – is the Payments Card Industry Data Security Standard (PCI DSS) version 4.0. Luckily, this white paper will outline the most important changes to keep in mind for compliance planning and budgeting. Keep reading to learn more.
Posted: 04 Nov 2022 | Published: 05 Nov 2022

TOPICS:  .NET

5 ways to simplify and get DevSecOps right for development, operations, and security teams
WHITE PAPER: More than 70% of organizations have or plan to incorporate security into their DevOps processes according to ESG and Coalfire. The full embrace of DevSecOps is the future. This white paper explores how organizations are implementing security
Posted: 15 Oct 2022 | Published: 15 Oct 2022

TOPICS:  .NET

4th Annual Penetration Risk Report
ANALYST REPORT: As technology evolves, and cybercriminals update their methodology, it is vital that cybersecurity professionals stay up to date on the latest risks and threats. This report uses penetration testing data to analyze risk, looking at where cybercriminals are attacking in order to determine where the most relevant threats lie. Read on to learn more.
Posted: 23 Sep 2022 | Published: 23 Sep 2022

TOPICS:  .NET

Sitting in cars with hackers
WHITE PAPER: According to a recent study, the costs of cybercrime are 6,000 times greater than the collective net worth of the companies that strive to prevent it. This white paper analyzes the state of cybersecurity testing, and advocates for a more intensive approach that removes arbitrary limitations for more realistic testing. Read on to learn more.
Posted: 21 Sep 2022 | Published: 21 Sep 2022

TOPICS:  .NET

Software Supply Chain Risk
ANALYST REPORT: Due to cloud’s vulnerability, as well as evolving risk, securing the supply chain has never been more difficult. This report leverages data to analyze the growing importance of supply chain risk management programs and how they are capable of navigating the security vulnerabilities inherent to supply chains. Read on to learn more.
Posted: 20 Sep 2022 | Published: 20 Sep 2022

TOPICS:  .NET

System and Organization Controls (SOC) reports: Understanding the differences
WHITE PAPER: System and Organization Control (SOC) reports are valuable tools for organizations to help build trust in their security and controls posture. Access this guide to learn key differences among the 5 SOC reports offered by Coalfire to help you understand the purpose of each report type and how it benefits a particular audience.
Posted: 18 May 2022 | Published: 18 May 2022

TOPICS:  .NET

Compliance Accelerator – HITRUST
WHITE PAPER: As the global standard for safeguarding information, HITRUST delivers a scalable, prescriptive and certifiable framework that enables organizations to demonstrate information security and privacy assurances to a global audience. Read on to learn how you can apply the 3-phase methodology to get a step ahead of your competitors.
Posted: 18 May 2022 | Published: 18 May 2022

TOPICS:  .NET

Effective CISO board presentations
WHITE PAPER: The move to the digital enterprise with cybersecurity incidents have raised the interest of directors to hear directly from those in cybersecurity. Learn more about how to gain support with CISO presentations in this whitepaper.
Posted: 18 May 2022 | Published: 18 May 2022

TOPICS:  .NET

HITRUST CSF® Certification FREQUENTLY ASKED QUESTIONS
WHITE PAPER: The HITRUST Common Security Framework (CSF) was developed by IT and healthcare professionals to provide a framework for managing the security requirements inherent in the Health Insurance Portability and Accountability Act (HIPAA). Find more about some of the answers to the most common questions in this document.
Posted: 18 May 2022 | Published: 18 May 2022

TOPICS:  .NET

FEDRAMP AGENCY ATO ROUTE: WHAT DOES SPONSORSHIP ENTAIL?
WHITE PAPER: FedRAMP is a government-wide program that provides a standardized approach to conducting security assessments and granting authorizations. There are 3 main stakeholders: cloud service providers (CSPs), third-party assessment organizations (3PAOs), and government agencies. Read this white paper to learn about these roles and responsibilities.
Posted: 17 May 2022 | Published: 17 May 2022

TOPICS:  .NET

A newly hired CISO’s priorities: The first 30, 60, 90 days
WHITE PAPER: As a CISO, how can you establish early credibility and earn an enterprise-wide vote of confidence in your ability to make value-driven, impactful contributions to the enterprise’s business goals? Tap into this white paper to gain insights into priorities for CISOs during their first 90 days in office to help set the stage for a successful tenure.
Posted: 17 May 2022 | Published: 17 May 2022

TOPICS:  .NET

A strategic approach to sustaining HIPAA compliance
WHITE PAPER: Tap into this white paper to learn how you can efficiently manage your HIPAA program in a strategic fashion by assigning track leaders that are responsible for key elements of your HIPAA program.
Posted: 17 May 2022 | Published: 17 May 2022

TOPICS:  .NET

FedRAMP: Top 10 most common questions from CSPs
WHITE PAPER: For many cloud service providers (CSPs), pursuing FedRAMP authorization can be a daunting and complex endeavor. This white paper outlines how Coalfire aims to answering your toughest questions. Access now to learn the answers to 10 commonly asked questions from CSPs.
Posted: 17 May 2022 | Published: 17 May 2022

TOPICS:  .NET

5 ways to efficiently manage hybrid cloud environments
WHITE PAPER: According to a recent ESG survey, 47% of respondents stated that the most common challenge with securing cloud-native applications and infrastructure is maintaining consistency across data center and public cloud environments. Tap into this white paper to learn 5 ways you can simplify and efficiently manage your hybrid environments.
Posted: 12 May 2022 | Published: 13 May 2022

TOPICS:  .NET

FedRAMP government enclaves – essential for cloud service providers
WHITE PAPER: Federal agencies continue to aggressively procure and implement public cloud deployment models and require FedRAMP accreditation for CSPs – but it’s easier said than done. Tap into this white paper to learn key strategies in managing services and maintaining FedRAMP compliance.
Posted: 12 May 2022 | Published: 13 May 2022

TOPICS:  .NET

Identify and Remediate Application Vulnerabilities with Coalfire ThreadFix
ESG: 60% of organizations currently develop and deploy production cloud-native applications, according to ESG research. Tap into this ESG report to learn how the ThreadFix Platform is designed to provide sophisticated content that can be communicated to the development and security teams.
Posted: 12 May 2022 | Published: 13 May 2022

TOPICS:  .NET

Application Security Champions Report
RESEARCH CONTENT: This application security champions report dives into how AppSec champion programs operate, what best practices are, and why you should consider adopting one for more consistent and secure software. Access it here.
Posted: 11 May 2022 | Published: 11 May 2022

TOPICS:  .NET

Aligning cyber risk management with business performance A CISO’s guide to earning a seat at the table
WHITE PAPER: Can a CISO or other cybersecurity professional really develop a program that mitigates critical business cyber risk and defends their budget? With the right guidance, it’s possible. Read this guide to learn how InfoSec leaders can align cyber risk management with business performance and bottom line.
Posted: 05 Feb 2022 | Published: 05 Feb 2022

TOPICS:  .NET

It’s digital transformation time Do you know where your CISO is?
WHITE PAPER: Tap into this white paper to learn the importance of having an executive leader that can manage the digital transformation and security transformation of your organization while maintaining business objectives.
Posted: 05 Feb 2022 | Published: 05 Feb 2022

TOPICS:  .NET

How’s your cybersecurity program health? A Strategy+ primer
WHITE PAPER: As businesses hurtle toward dynamic multi-cloud environments, rapid-fire regulations and unforeseen risks are impacting security programs like never. Download this white paper to explore how to understand the symptoms of a poorly strategized cyber program and how to rectify those symptoms with solutions.
Posted: 04 Feb 2022 | Published: 04 Feb 2022

TOPICS:  .NET

Standing up a privacy program A user’s guide
RESOURCE: Most privacy regulations include requirements for data minimization – the practice of collecting only the data needed for a specific purpose and retaining it only for as long as that purpose requires. This paper examines the concept of data minimization as a risk avoidance strategy and will discuss a number of implementation techniques.
Posted: 04 Feb 2022 | Published: 04 Feb 2022

TOPICS:  .NET

How to manage cyber risk Guidance for business leaders
WHITE PAPER: Business leaders have an obligation to protect their enterprise’s assets and reputation, and, as a result, are increasingly accountable for understanding and managing cyber risk. Read this white paper to explore guidelines on how to develop proper cyber risk management oversight.
Posted: 03 Feb 2022 | Published: 03 Feb 2022

TOPICS:  .NET

The maturing CISO role
ANALYST REPORT: Today’s CISOs are expanding and deepening their influence across the typical organization through the shifts caused by digital transformation. To evaluate the state of CISO influence, Dark Reading conducted a comprehensive survey for 2021. Download now to unlock a complete overview of survey findings.
Posted: 02 Dec 2021 | Published: 02 Dec 2021

TOPICS:  .NET