Core Security In the News

Core Security has been mentioned or quoted in the following news articles.  

Published Datesort ascending Link Source
06.06.2006 Penetration Testing Key to HIPAA Compliance for Care New England Larry Pesce, an IT manger with Care New England Health System, explains how he chose an automated penetration testing system that not only attacks but reports its findings for a complete picture of the network's health.IT Business Edge
06.01.2006 Core Updates Security Testing Tools eWEEK.com
05.22.2006 Core Impact Tutorial The Ethical Hacker Network
05.16.2006 Penetration Testing Is First Stop for Alstom Alstom needed a product that provided more information and required less learning.Dark Reading
05.15.2006 Put an end to manual penetration testing Core Impact automates the task of finding security vulnerabilitiesFCW.COM
05.15.2006 Core Impact Demo We had Core Security give us a web demo on their product Core Impact.Cutaway Security
05.02.2006 Core Impact puts a vise grip on vulnerabilities A deeper look at Core Security's long-standing scanner shows the value of commercial vulnerability solutionsInfoWorld
04.26.2006 Trends 2006: Application Security Testing Security is a component of quality, so QA should perform security testing, says Michael Gavin with Galen Schreck and Thomas PowellExpress Computer
04.03.2006 Sixth Annual eWEEK Excellence Awards Finalists CORE IMPACT 5.0 was selected as finalisteWEEK.com
03.31.2006 Innovative IPSes resist our attacks To put IntruShield to the test, we used our favorite tool, Core Impact, throwing 15 attacks from the SANS/FBI Top 20 at the IPS. Info World
03.21.2006 Core Impact 5.1 Law Technology News
03.20.2006 Security Pros Push for Secure Code Savvy security execs are deploying new tools to help developers with secure codeNetwork World
03.15.2006 UTM appliances whip blended security threats Unified threat management appliances combine multiple perimeter protections with mixed resultsInfo World
03.06.2006 Trends 2006: Application Security Testing Applications are business enablers, allowing people and programs to access the data and information they need to perform their work. Because that information is often the target of an attacker, applications must be designed and implemented based on securi
03.04.2006 Tool Simulates Real-Life Attacks eWeek
02.22.2006 CORE IMPACT Review Core Impact is different in that while it performs vulnerability assessment, it is primarily a penetration testing tool. It behaves like a hacker, performing vulnerability and port scans then attempting to penetrate the target using the vulnerabilities it
01.10.2006 Core Security Technologies Announces Enhanced Version of its Automated Penetration Testing Product, CORE IMPACT ™, Focusing on Client-Side Threats CORE IMPACT v5.1 Comes in Response to Increased Malicious Attacks on Desktop Applications ITsecurity.com
12.09.2005 Face-off Is Penetration Testing More Effective Than Vulnerability Scanning?Network World
11.21.2005 Powerful payloads: The evolution of exploit frameworks SearchSecurity.com
10.06.2005 Cost-Effective Penetration Testing Petroleum and Wholesale Distributor Looks to Automated, Easy-to-Use Penetration Testing Product to Help Enhance its Network Security.Sarbanes-Oxley Compliance Journal

Pages