Core Security In the News

Published Datesort ascending Link Source
06.13.2006 Vulnerabilities put Asterisk telephone systems at risk SC Magazine
06.13.2006 Saving for a Rainy Day Latin Finance
06.09.2006 Security Complex Global Finance
06.06.2006 Penetration Testing Key to HIPAA Compliance for Care New England Larry Pesce, an IT manger with Care New England Health System, explains how he chose an automated penetration testing system that not only attacks but reports its findings for a complete picture of the network's health.IT Business Edge
06.06.2006 Hacking ignorance isn't bliss Just because you haven't been hacked doesn't mean you can't beInfoWorld
06.06.2006 INTRUSION PREVENTION SearchSecurity.com
06.01.2006 Core Updates Security Testing Tools eWEEK.com
05.22.2006 Core Impact Tutorial The Ethical Hacker Network
05.16.2006 Penetration Testing Is First Stop for Alstom Alstom needed a product that provided more information and required less learning.Dark Reading
05.15.2006 Put an end to manual penetration testing Core Impact automates the task of finding security vulnerabilitiesFCW.COM
05.15.2006 Core Impact Demo We had Core Security give us a web demo on their product Core Impact.Cutaway Security
05.02.2006 Core Impact puts a vise grip on vulnerabilities A deeper look at Core Security's long-standing scanner shows the value of commercial vulnerability solutionsInfoWorld
04.26.2006 Trends 2006: Application Security Testing Security is a component of quality, so QA should perform security testing, says Michael Gavin with Galen Schreck and Thomas PowellExpress Computer
04.03.2006 Sixth Annual eWEEK Excellence Awards Finalists CORE IMPACT 5.0 was selected as finalisteWEEK.com
03.31.2006 Innovative IPSes resist our attacks To put IntruShield to the test, we used our favorite tool, Core Impact, throwing 15 attacks from the SANS/FBI Top 20 at the IPS. Info World
03.21.2006 Core Impact 5.1 Law Technology News
03.20.2006 Security Pros Push for Secure Code Savvy security execs are deploying new tools to help developers with secure codeNetwork World
03.15.2006 UTM appliances whip blended security threats Unified threat management appliances combine multiple perimeter protections with mixed resultsInfo World
03.06.2006 Trends 2006: Application Security Testing Applications are business enablers, allowing people and programs to access the data and information they need to perform their work. Because that information is often the target of an attacker, applications must be designed and implemented based on securi
03.04.2006 Tool Simulates Real-Life Attacks eWeek

Pages