Quantcast
Channel: Verifying IT security defenses – Core Security Blog
Browsing all 104 articles
Browse latest View live

Passion and Relevance is Our Core

Nearly every IT security company sees its ultimate goal as making the electronic world a safer place to live and do business. At Core, we embrace this pursuit in a truly unique and powerful manner.

View Article



Hathaway – U.S. Government Needs IT Risk Management

Melissa Hathaway's presentation at RSA Conference 2009 appeared to embrace a more risk-based approach to enterprise security, which should include heavy doses of vulnerability management work.

View Article

The Thing with Zero Days…

People frequently ask us just what Core does about zero days. Quite simply, we do everything that we can to ensure that the vulnerabilities graduate from zero day status as soon as we possibly can.

View Article

Inside is the New Outside

The only way to truly understand how vulnerable your IT systems may be is to proactively test your end users to manage related risks.

View Article

Elevating the Visibility Provided by Automated Pen Testing

With the introduction of CORE IMPACT Pro v9 we're adding new levels of visibility into penetration testing and the many benefits it provides in helping organizations improve their overall IT security...

View Article


Realities of Cyber-War

Whether or not the threat of cyber-war is impending, the U.S. government needs to move quickly to ensure that it improves situational awareness and response capabilities.

View Article

Enhancing Post-Breach Situational Awareness and Forensics

It's time for organizations to embrace penetration testing as the best source of siutational awareness for post-incident breach investigation.

View Article

Another Successful Black Hat for Core

Black Hat USA 2010 proved to be every bit as exciting and successful for Core Security as we had hoped and expected it would be going in.

View Article


Plugging In: Pen Testing and the Energy Sector

Penetration testing is one of the practices that energy industry companies must employ to improve their overall IT security standing.

View Article


The BIOS-Embedded Anti-Theft Persistent Agent that Couldn’t: Handling the...

Core Security CTO Ivan Arce responds to claims by Absolute Software that the research published by our CoreLabs experts at the Black Hat USA 2009 conference was not accurate, and that they weren't...

View Article

Epic Cyber Crime in the Headlines (Again): Albert Gonzalez and the Assault on...

The recent indictment of Albert Gonzalez, as reported in this morning’s Wall Street Journal cover story, illustrates the sophistication and organization of the “underground economy” of cybercrime....

View Article

Proxying CORE IMPACT Pro through a secure proxy

Sometimes when conducting a test, you really don't want your traffic to be seen, and using a SOCKS proxy is one good way to do just that.

View Article

Another Step in IT Security Testing

The process of testing IT security mechanisms to measure and validate their efficacy is a nascent idea, but we're already getting there.

View Article


Tracing Gonzalez’ Footsteps: Exploiting “Low-Risk” SQL Injection

Albert Gonzalez' attacks on companies like Heartland Data highlight the true value of proactively testing IT security controls and validating vulnerabilities using CORE IMPACT Pro.

View Article

Cloud Computing: The Gathering Storm

Cloud computing offers a number of powerful benefits, but also introduces significant risks.

View Article


Extensive Ownage – Unleashing IMPACT Pro for the First Time

One CORE IMPACT Pro customer recounts his initial experiences in testing his assets against automated penetration testing software.

View Article

The Delicate Art of Predicting Risk

Core CTO Ivan Arce has addressed the challenge of accurately predicting the future of IT risk management, and offered his best theories on how to do so, in a new blog post on CSO.com

View Article


Security Practitioners Demand Internal Pen Testing Capabilities

Results from a poll taken during one of our recent webcasts illustrate how cybercrime and compliance efforts are driving significant interest in internal penetration testing.

View Article

Real World Stories: How Pen Tests Complement Vulnerability Scans

One of Core Security's most dedicated customers offers his opinion on why penetration testing is so valuable when used in cooperation with vulnerability scanners and other proactive security practices.

View Article

Cyber-Insurance Advancement Underscores Data Breach Risk Recognition

Chubb Group's move to expand its CyberSecurity insurance programs highlights the fact that IT security risks are finally being recognized in more traditional risk mitigation arenas.

View Article
Browsing all 104 articles
Browse latest View live




Latest Images