Core Security In the News

Published Datesort ascending Link Source
02.22.2006 CORE IMPACT Review Core Impact is different in that while it performs vulnerability assessment, it is primarily a penetration testing tool. It behaves like a hacker, performing vulnerability and port scans then attempting to penetrate the target using the vulnerabilities it
01.10.2006 Core Security Technologies Announces Enhanced Version of its Automated Penetration Testing Product, CORE IMPACT ™, Focusing on Client-Side Threats CORE IMPACT v5.1 Comes in Response to Increased Malicious Attacks on Desktop Applications ITsecurity.com
12.09.2005 Face-off Is Penetration Testing More Effective Than Vulnerability Scanning?Network World
11.21.2005 Powerful payloads: The evolution of exploit frameworks SearchSecurity.com
10.06.2005 Cost-Effective Penetration Testing Petroleum and Wholesale Distributor Looks to Automated, Easy-to-Use Penetration Testing Product to Help Enhance its Network Security.Sarbanes-Oxley Compliance Journal
09.21.2005 The threat with the most disaster potential, Part 2 SearchSecurity.com
09.09.2005 The buzz about fuzzers When you've got to have secure code -- and everyone does -- fuzzers can help.InfoWorld
08.18.2005 Core Security Helps Admins Hack Their Own Networks "Penetration testing picks up where 'scan and identify' leaves off," said Charles J. Kolodgy, research director at IDC. "As companies move to integrated solutions for greater protection, penetration testing will become more important." Newsfactor Network
08.09.2005 Critical fixes for IE, Windows SearchSecurity.com
08.08.2005 TippingPoint leans into network threats TippingPoint 400 IPS is a mixed bag of easy management, strong defenses, and spotty detection.InfoWorld
07.01.2005 Preempt security threats with testing and assessment tools If you're in charge of disaster recovery planning, you also have to consider security threats that could put you in the recovery mode. Mike Talon discusses the preemptive moves you can make with the right testing and assessment tools.TechRepublic
06.23.2005 Review: Penetration Testing Software A penetration assessment will ensure your network is secure from attackers as well as malicious employees, partners and customers. We evaluated three products that take decidedly different routes to the same end. Which solution will leave you feeling bull
06.01.2005 ECHKNOWLEDGE Exploit frameworks are the machine guns of automated attacks. Don't get caught on the wrong end of the barrel.Information Security Magazine
04.14.2005 Core Security's Testing Tango Next-Gen Data Center Forum
04.11.2005 Cash infusion means jobs at Core Boston Herald
04.11.2005 Core Security collects $4.5M in second round Mass High Tech
03.28.2005 Paper maker documents key IT security issues Network World Fusion
02.21.2005 IT administrators told to get hacking Time to learn the tricks of the trade, says security expertvnunet.com
02.11.2005 MSN Messenger Exploit Code Goes Public Although no attacks based on the hole have been reported, the security community is bracing itself for at least some. MSN Messenger is used by over 130 million people worldwide, making it an attractive target. "I think we can expect to start seeing malici
02.11.2005 MSN Logged on For Attacks Techtree.com

Pages