Resources

Filters

White Paper

Responsible AI

AI risks, such as the spread of misinformation, data privacy concerns, and psychological impact can produce direct harm and have negative, unintended consequences for individuals, populations, and societies. Solving these issues requires new thinking in AI risk management.

  • Cybersecurity

White Paper

HITRUST Compliance - A Roadmap for Success

"HITRUST Compliance: A Roadmap for Success" by Lenise L. Wilson provides a comprehensive guide on achieving and maintaining HITRUST Certification, a crucial standard for information security and privacy across industries. 

  • Compliance

Video

Coalfire Celebrates International Women's Day

It takes vulnerability, working to understand differences, transparency, and cultivating authentic relationships to build an inclusive foundation. Coalfire’s VP of Human Resources, Heather Minks, sits down with some of our women leaders to discuss how they harness authenticity and empathy to create safe spaces at work.

Case Study

Cisco achieves FedRAMP success through Coalfire's Advisory Services

Cisco is a Fortune 500 company, and the U. S. federal government is one of its mission-critical customers. Prashant Vadlamudi, vice president of Cisco Global Cloud Compliance saw the need to automate cloud compliance across the company. Working with cloud engineering and advisory partner Coalfire, Cisco’s centralized strategy enables SaaS product teams to meet and maintain global compliance certifications more efficiently, accelerating Cisco’s time to market, and enabling operational and cost efficiencies.

  • FedRAMP®

Data Sheet

StateRAMP assessment services

Before cloud service providers (CSPs) can sell to state and local governments, they must prove their cybersecurity measures are powerful enough to protect customers’ infrastructure and applications. Learn more in our StateRAMP assessment services data sheet.

  • Compliance
  • FedRAMP®

Video

Adversarial AI: Navigating the cybersecurity landscape

Coalfire’s Red Team Operations Leader, Pete Deros, discusses generative AI and Large Language Models (LLMs), how adversaries are using these tools for effective ransomware scenarios, realistic-sounding phishing campaigns, and even writing malware and code to wreak network havoc in minutes.

  • Cybersecurity

White Paper

Peeking under the hood: A holistic look at application-level risks

Technology continues to move at an accelerated rate. We’ll continue to see a rapid adoption of artificial intelligence and other tools that transform the healthcare sector. If this transformation is to be for the better, we must care for its cybersecurity operations as a car enthusiast would care for their most cherished, classic car.

  • Application security