Passion and Relevance is Our Core
Nearly every IT security company sees its ultimate goal as making the electronic world a safer place to live and do business. At Core, we embrace this pursuit in a truly unique and powerful manner.
View ArticleHathaway – U.S. Government Needs IT Risk Management
Melissa Hathaway's presentation at RSA Conference 2009 appeared to embrace a more risk-based approach to enterprise security, which should include heavy doses of vulnerability management work.
View ArticleThe Thing with Zero Days…
People frequently ask us just what Core does about zero days. Quite simply, we do everything that we can to ensure that the vulnerabilities graduate from zero day status as soon as we possibly can.
View ArticleInside is the New Outside
The only way to truly understand how vulnerable your IT systems may be is to proactively test your end users to manage related risks.
View ArticleElevating the Visibility Provided by Automated Pen Testing
With the introduction of CORE IMPACT Pro v9 we're adding new levels of visibility into penetration testing and the many benefits it provides in helping organizations improve their overall IT security...
View ArticleRealities of Cyber-War
Whether or not the threat of cyber-war is impending, the U.S. government needs to move quickly to ensure that it improves situational awareness and response capabilities.
View ArticleEnhancing Post-Breach Situational Awareness and Forensics
It's time for organizations to embrace penetration testing as the best source of siutational awareness for post-incident breach investigation.
View ArticleAnother Successful Black Hat for Core
Black Hat USA 2010 proved to be every bit as exciting and successful for Core Security as we had hoped and expected it would be going in.
View ArticlePlugging In: Pen Testing and the Energy Sector
Penetration testing is one of the practices that energy industry companies must employ to improve their overall IT security standing.
View ArticleThe BIOS-Embedded Anti-Theft Persistent Agent that Couldn’t: Handling the...
Core Security CTO Ivan Arce responds to claims by Absolute Software that the research published by our CoreLabs experts at the Black Hat USA 2009 conference was not accurate, and that they weren't...
View ArticleEpic Cyber Crime in the Headlines (Again): Albert Gonzalez and the Assault on...
The recent indictment of Albert Gonzalez, as reported in this morning’s Wall Street Journal cover story, illustrates the sophistication and organization of the “underground economy” of cybercrime....
View ArticleProxying CORE IMPACT Pro through a secure proxy
Sometimes when conducting a test, you really don't want your traffic to be seen, and using a SOCKS proxy is one good way to do just that.
View ArticleAnother Step in IT Security Testing
The process of testing IT security mechanisms to measure and validate their efficacy is a nascent idea, but we're already getting there.
View ArticleTracing Gonzalez’ Footsteps: Exploiting “Low-Risk” SQL Injection
Albert Gonzalez' attacks on companies like Heartland Data highlight the true value of proactively testing IT security controls and validating vulnerabilities using CORE IMPACT Pro.
View ArticleCloud Computing: The Gathering Storm
Cloud computing offers a number of powerful benefits, but also introduces significant risks.
View ArticleExtensive Ownage – Unleashing IMPACT Pro for the First Time
One CORE IMPACT Pro customer recounts his initial experiences in testing his assets against automated penetration testing software.
View ArticleThe Delicate Art of Predicting Risk
Core CTO Ivan Arce has addressed the challenge of accurately predicting the future of IT risk management, and offered his best theories on how to do so, in a new blog post on CSO.com
View ArticleSecurity Practitioners Demand Internal Pen Testing Capabilities
Results from a poll taken during one of our recent webcasts illustrate how cybercrime and compliance efforts are driving significant interest in internal penetration testing.
View ArticleReal World Stories: How Pen Tests Complement Vulnerability Scans
One of Core Security's most dedicated customers offers his opinion on why penetration testing is so valuable when used in cooperation with vulnerability scanners and other proactive security practices.
View ArticleCyber-Insurance Advancement Underscores Data Breach Risk Recognition
Chubb Group's move to expand its CyberSecurity insurance programs highlights the fact that IT security risks are finally being recognized in more traditional risk mitigation arenas.
View Article
More Pages to Explore .....