Core Security In the News

Core Security has been mentioned or quoted in the following news articles.  

Published Datesort ascending Link Source
03.06.2006 Trends 2006: Application Security Testing Applications are business enablers, allowing people and programs to access the data and information they need to perform their work. Because that information is often the target of an attacker, applications must be designed and implemented based on securi
03.04.2006 Tool Simulates Real-Life Attacks eWeek
02.22.2006 CORE IMPACT Review Core Impact is different in that while it performs vulnerability assessment, it is primarily a penetration testing tool. It behaves like a hacker, performing vulnerability and port scans then attempting to penetrate the target using the vulnerabilities it
01.10.2006 Core Security Technologies Announces Enhanced Version of its Automated Penetration Testing Product, CORE IMPACT ™, Focusing on Client-Side Threats CORE IMPACT v5.1 Comes in Response to Increased Malicious Attacks on Desktop Applications
12.09.2005 Face-off Is Penetration Testing More Effective Than Vulnerability Scanning?Network World
11.21.2005 Powerful payloads: The evolution of exploit frameworks
10.06.2005 Cost-Effective Penetration Testing Petroleum and Wholesale Distributor Looks to Automated, Easy-to-Use Penetration Testing Product to Help Enhance its Network Security.Sarbanes-Oxley Compliance Journal
09.21.2005 The threat with the most disaster potential, Part 2
09.09.2005 The buzz about fuzzers When you've got to have secure code -- and everyone does -- fuzzers can help.InfoWorld
08.18.2005 Core Security Helps Admins Hack Their Own Networks "Penetration testing picks up where 'scan and identify' leaves off," said Charles J. Kolodgy, research director at IDC. "As companies move to integrated solutions for greater protection, penetration testing will become more important." Newsfactor Network
08.09.2005 Critical fixes for IE, Windows
08.08.2005 TippingPoint leans into network threats TippingPoint 400 IPS is a mixed bag of easy management, strong defenses, and spotty detection.InfoWorld
07.01.2005 Preempt security threats with testing and assessment tools If you're in charge of disaster recovery planning, you also have to consider security threats that could put you in the recovery mode. Mike Talon discusses the preemptive moves you can make with the right testing and assessment tools.TechRepublic
06.23.2005 Review: Penetration Testing Software A penetration assessment will ensure your network is secure from attackers as well as malicious employees, partners and customers. We evaluated three products that take decidedly different routes to the same end. Which solution will leave you feeling bull
06.01.2005 ECHKNOWLEDGE Exploit frameworks are the machine guns of automated attacks. Don't get caught on the wrong end of the barrel.Information Security Magazine
04.14.2005 Core Security's Testing Tango Next-Gen Data Center Forum
04.11.2005 Cash infusion means jobs at Core Boston Herald
04.11.2005 Core Security collects $4.5M in second round Mass High Tech
03.28.2005 Paper maker documents key IT security issues Network World Fusion
02.21.2005 IT administrators told to get hacking Time to learn the tricks of the trade, says security