Cyber Security Awareness and Vulnerabilities Blog

Image
role-design-access-security

Role-Based Access Control: Why It Delivers a Modern Approach for Managing Access

Apr 6, 2021
Relying on outdated methods to manage user access is both a constant struggle and a persistent risk to your business. Manually keeping track of users and entitlements is costly, time-consuming, and daunting. But with a modern role-based approach, you can embrace a smarter, simpler, more secure way to manage user access.
Image
Penetration Testing Frequency: How Often Should You Test?

Penetration Testing Frequency: How Often Should You Test?

Mar 30, 2021
Penetration testing has become an increasingly standard exercise, with organizations using either pen testing services or in-house teams to uncover weaknesses and assess their security posture.
Image
3 Reasons You Should Be Using SIEM

3 Reasons You Should Be Using SIEM

Mar 24, 2021
Security Information and Event Management (SIEM) solutions have been around for years, helping to identify and escalate critical security events. SIEM solutions have become integral to many organizations’ security portfolios. In fact, according to the 2021 SIEM Report by Cybersecurity Insiders, 74 percent of respondents ranked SIEM as very to extremely important to their organization’s security posture.
Image
Core Impact Tiered Pricing

How The Power of Core Impact is More Accessible Than Ever Before

Mar 8, 2021
Security teams are increasingly turning to penetration testing tools to advance their in-house programs through strategic exploitation automation. However, it can be challenging to round out a comprehensive and integrated pen testing toolset that meets both your organization’s requirements as well as your budget.
Image
privileged-access-management-lock

Why Privileged Access Management Matters Now More Than Ever

Mar 4, 2021
If the last year has demonstrated any lessons for IT and security teams, it’s this: managing privileged access should be a top priority for the business. When a large portion of the workforce began working remotely, there was a frenzy to extend access so individuals could perform their jobs from home. Yet this may have unintentionally caused inappropriate access levels to be extended to employees. This becomes especially problematic if those access levels are elevated or privileged within the business.
Image
connectors-gears-with-arrows

Three Ways an Identity Governance Solution Should Integrate with Enterprise Data

Feb 18, 2021
Chances are your organization is relying on an extensive number of enterprise applications, systems, and platforms to ensure successful execution of the business. According to an article in The Wall Street Journal, large organizations rely on an average of nearly 130 applications across their business, while smaller firms use around 70 applications on average.
Image
The Importance of Source Code Audits and Application Pen Tests thumb

The Importance of Static Application Testing and Application Pen Tests

Feb 15, 2021
Pen testing is a well-established practice for many organizations. With such diverse environments consisting of different applications from different vendors, it’s safe to assume security weaknesses are lurking somewhere. But why aren’t these security flaws found earlier, by the creators themselves? In this blog, we’ll explore why applications should also go through security testing and review during the development stage.
Image
remote-workforce-access

Remote Work Is Here to Stay: How to Deal with Access Risks Across an Expanded Workforce

Feb 11, 2021
While no one could have anticipated the way in which COVID-19 would change the workforce over the last year, perhaps even more unexpected is the lasting impact the pandemic will have on remote work. With millions of employees still working from home, organizations are especially vulnerable because they lack visibility into the actual access levels employees possess across the collaboration tools and applications that make remote work possible.
Image
3 Ways Core Impact Can Benefit Large Security Teams

3 Ways Core Impact Can Benefit Large Security Teams

Feb 2, 2021
As the need for regular security assessments continues to grow, penetration testing tools are helping organizations advance their in-house programs through strategic automation. However, there is a misconception that automated tools are best for those with a reduced headcount, like small teams or individuals.
Image
Securing IOT Devices

6 Steps to Better Securing the Internet of Things (IoT)

Jan 19, 2021
These days, an organization’s technology stack isn’t merely computers and servers. The Internet of Things (IoT)—a catch all term for the many different devices that have sensors or software that connect them to the Internet—has carved out a foothold in every industry. Hospitals are filled with devices that monitor patient status, farmers are using sensors placed in the ground to obtain data about soil, and utility plants rely on SCADA systems to keep things running.
Image
gettting inside the mind of an attacker part 5
Image
2021 predictions

Adapting to a Changed World: 6 Cybersecurity Predictions for 2021

Dec 22, 2020
As a new year looms bright with possibility in front of us, how can we prepare for a world that looks profoundly different than it did a year ago? On the cybersecurity front, we can always anticipate continuing battles with familiar foes, as well as a few new challenges on the horizon. Though we may not have a crystal ball, based on our observations and discussions, here are six predictions for the upcoming year.
Image
pen testing for a remote workforce

Finding Clarity in the Chaos: 5 Cybersecurity Trends of 2020

Dec 22, 2020
As 2020 comes to an end and we anticipate gleefully tossing our calendars in the garbage, we can all agree it was one of the most tumultuous years in recent history. It was a difficult time for almost every person and industry, and cybersecurity was certainly no exception, with shocking breaches, mass transitions to remote working, and threat actors thriving as the pandemic raged on. Though we’re as eager as everyone else to look forward, let’s look back at 2020 one more time to identify trends that may help you plan for a better 2021.
Image
segregation-of-duties-in-identity-governance

Why Identity Governance Is Essential for Segregation of Duties (SoD)

Dec 18, 2020
It’s no secret that organizations today face a constant onslaught of identity-related access risks within the current threat landscape. One of the most critical and potentially damaging access risks that can exist under the surface of an organization is the lack of controls to ensure adequate segregation of duties (SoD).
Image
cobalt strike interoperability with core impact thumb

Interoperability with Cobalt Strike and Other Notable New Features in Core Impact 20.3

Dec 11, 2020
The latest release of Core Impact has arrived! Version 20.3 showcases our commitment to creating a comprehensive, streamlined process for testing the defenses of any IT environment. At the forefront of this effort is the debut of exciting new interoperability capabilities with our red teaming platform, Cobalt Strike. Additionally, this latest release includes new features focused on both efficiency and ease of use.
Image
3 Reasons You May Need to Rethink Your Virus Protection Strategy thumbnail

3 Reasons You May Need to Rethink Your Virus Protection Strategy

Dec 8, 2020
These days, encountering malware like viruses, ransomware, trojans, or worms has become all too common—it’s almost an inevitability. In fact, according to the 2020 Malware Report by Cybersecurity Insiders, 88% see malware as an extreme or moderate threat, and 75% believe malware and ransomware will increase in the next year.
Image
A day in the life of a pen tester thumbnail
Image
identity-governance-lock

‘You Can’t Boil the Ocean’: How a Phased Approach Can Help Your IGA Program Succeed

Nov 18, 2020
Implementing an Identity Governance and Administration (IGA) solution can be a daunting task. Organizations of all sizes recognize the complexity of mitigating identity-related access risks across countless devices, applications, and systems, but need a way to see through the competing priorities and to understand that IGA is not an all or nothing proposition. Rather than a destination, Identity Governance and Administration should be viewed as a journey.
Image
Open Source vs. Enterprise: Why Not All Exploits are Created Equal

Open Source vs. Enterprise: Why Not All Exploits are Created Equal

Nov 11, 2020
A common tactic of attackers trying to breach an environment is to use an exploit against a known vulnerability in an application or device present in a targeted infrastructure. Exploiting a vulnerability can provide an attacker with privileges or capabilities they would not normally be granted.
Image
security-locks-with-open-lock

Missing Critical Threats in Your Network? Here’s How to Quickly Detect Active Infections

Nov 2, 2020
Within today’s threat landscape, the regularity of data breaches comes as no surprise. And their impact continues to be far reaching and extremely costly. According to the 2020 Cost of a Data Breach Report conducted by the Ponemon Institute, the average cost of a breach is now $3.86 million and the average time to contain the breach is 280 days. With more than 15 billion records exposed annually, data breaches have significant consequences that can impact organizations negatively for the short- and long-term.
Image
lock-in-city-scape

What You Don’t Know About Access Management Is Hurting You

Oct 20, 2020
The impact of COVID-19 has been far-reaching across nearly every sector. Millions of employees now work remotely, making companies particularly vulnerable when it comes to external access risks. Many organizations lack a centralized process to manage user access to accounts and resources. They often have limited visibility into access levels users possess to data and systems within their network. And they may be quickly adding or changing access levels to meet the needs of their remote workforce.
Image
Top 12 Vulnerability Scanners for Cybersecurity Professionals

Top 12 Vulnerability Scanners for Cybersecurity Professionals

Oct 6, 2020
Vulnerability scanners are valuable tools that search for and report on what known vulnerabilities are present in an organization’s IT infrastructure. Using a vulnerability scanner is a simple, but critical security practice that every organization can benefit from. These scans can give an organization an idea of what security threats they may be facing by giving insights into potential security weaknesses present in their environment.
Image
What is NTA? (thumbnail image)

What is Network Traffic Analysis?

Oct 2, 2020
Network Traffic Analysis (NTA) is a category of cybersecurity that involves observing network traffic communications, using analytics to discover patterns and monitor for potential threats. NTA solutions can be powerful tools for any organization, alerting security teams to an infection early enough to avoid costly damage. However, in today’s threat landscape, there are many different types of cybersecurity solutions, so let’s examine what sets NTA apart, and why you should incorporate it.