Cyber Security Awareness and Vulnerabilities Blog

Image
Cloud Security

Cloud Watching: Ensuring Security in Every Cloud Environment

Nov 1, 2018
Though the common vernacular is “The Cloud,” the truth is, there are multiple cloud environments and providers available to organizations looking to utilize this growing technology. Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents. Cloud Types Terminology in cloud computing is growing almost as rapidly as the technology. The following list outlines the important differences between the most common types of cloud deployments:
Image
Cloud Security

The Shared Responsibility of Cloud Security

Oct 25, 2018
Even doubters now agree that the forecast of the future of cloud computing is sunnier than ever. As more and more people and organizations transition to cloud services, the question of how to keep the cloud secure becomes more important than ever. Though initially unclear, as the latest report from the Cloud Security Alliance (CSA) suggests, the agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Image
Computer keyboard with digital people icons

A Case for PEDM

Sep 24, 2018
Privileged Account and Session Management (PASM) tools, better known as password vaulting, are a type of PAM solution that restricts user access to IT systems and protects an organization’s data. Some organizations implement password vaulting technology to get started with managing privilege. However, as an infrastructure becomes more multifaceted, additional solutions that utilize other access management strategies should be integrated to maintain speed and security.
Image
Typing on computer with security shield

Three Signs You’ve Outgrown Password Vault

Sep 24, 2018
Privileged Account and Session Management (PASM) software, better known as password vaulting, is a type of Privileged Access Management (PAM) solution that helps organizations manage accounts by restricting root access to their environment. These solutions are invaluable for protecting data.

Different Paths, Same Goal: Privileged Account and Session Management (PASM) and Privilege Elevation and Delegation Management (PEDM)

Sep 23, 2018
Acronyms abound when it comes to Privileged Access Management (PAM). PIM, PAM, PUM, and SUPM, to name a few. As PAM solutions have evolved, analyst firm Gartner has established two further classifications to highlight different approaches: Privileged Account and Session Management (PASM) and Privilege Elevation and Delegation Management (PEDM). PASM and PEDM are two categories of security tools that have distinct approaches in how they manage access.
Image
Computer with ransomware

Endpoint Antivirus Software: What It Is, and Why You Need It

Sep 6, 2018
The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows infrastructure and focus their antivirus security efforts only on individual user workstations.
Image
Virus Protection

A Full Body Scan: Protect Your Organization with Endpoint Antivirus Software

Sep 6, 2018
With cyberattacks still on the rise, you can never be too careful when it comes to securing your company’s data and the systems that house it. The problem is, without advanced endpoint protection it can be hard to discover the malware, viruses, and worms that may be lurking not only on user workstations, but also in server environments.
Image
Digital lockpad inside circle

The Lifecycle of a Security Event

Aug 21, 2018
As a syslog server incessantly pings with every security notification, security teams can feel as though they are drowning in a sea of security warnings. Without a SIEM, it’s difficult to know which events are truly critical and which can be ignored. However, when a SIEM has been implemented, security teams get a much clearer picture of their environment’s security. There could truly be no threats, or multiple incidents may be occurring that simply have not yet affected performance.

The Six Ws of Granular Access Control

Jul 31, 2018
Security experts are in general agreement that passwords will simply no longer suffice when it comes to system security. As the numerous breaches within the past years have shown, it is too easy to crack passwords and gain access to all the data across entire systems. So, what can an organization do to better protect its systems? This is where granular access controls, a key feature in certain privileged access management solutions come in. 
Image
Security icons

Open Source SIEM vs. Enterprise-Level SIEM: Which Is Right for You?

Jul 25, 2018
Open source SIEM solutions provide basic functionality that can be great for smaller organizations that are just beginning to log and analyze their security event data. But over time, many IT pros find that open source SIEM software is too labor-intensive to be a viable option as the organization grows. In short, many organizations simply outgrow their open source solution.
Image
Digital Key

What Are the Three Most Common Access Risks?

Jul 11, 2018
These days it seems like there are security solutions for almost everything except the one thing you can never fully secure: humans. But while you can’t control everything they open or click on, you can control their access to your sensitive data.
Image
Data Security

Are Employees Undermining Your Data Breach Defenses from the Inside?

Jun 28, 2018
The annual Verizon Data Breach Report 2018 was released recently, and gives an independent, worldwide view of how market sectors are being attacked, scammed, spied on, and ransomed. 
Image
Man looking at a computer

How to Solve the Top Three Struggles of Identity Governance and Administration

Jun 27, 2018
Identity Governance and Administration (IGA) is a complex and growing set of solutions that are put in place to help your organization stay compliant with government or industry regulations and, perhaps more importantly, help secure your organization. However, with every new solution, there are a host of new problems. In working with our IGA customers, we keep seeing certain problems emerge so, in this blog, we will address the top three struggles of an IGA solution that we see most often.

How to Pen-Test with Core Impact

Jun 11, 2018
When conducting a penetration test, most testers will develop some type of process, and repeat that same process on every engagement. As I think through the basics of penetration testing, I believe that process can be broken up into six steps. Now, I’m not saying every tester follows every step or performs these steps in this exact order, however, this is a pretty good process to follow. Let’s take a closer look at each step.
Image
Virus Protection

4 Reasons You Need Native Linux Virus Scanning

Jun 11, 2018
In today’s connected environments, Linux IT professionals can no longer claim that viruses are only a Windows threat. The biggest excuse people make for forgoing virus protection is that they scan their client PCs and therefore no virus would make it to the server. However, effective malware defense requires multiple layers. This brings us to the importance of native virus scanning. The following highlights the four main reasons security experts give for using antivirus software that runs natively on your Linux system.
Image
Performance gears

Do I Need Identity Governance & Administration (IGA)?

May 30, 2018
Identity Governance & Administration (IGA) is commonly defined as 'the policy-based centralized orchestration of user identity management and access control.' Identity governance helps support overall IT security and regulatory compliance. Put into simpler terms, IGA means leveraging the most intelligent and efficient path to mitigating identity risk in your business. 
Image
IT Security

Security So Easy, A Sales Guy Can Do It

May 16, 2018
Much like how I complain that I’m not losing weight - even though my treadmill has become a clothing rack- security only works if you use it. And, yes, I know I picked on the sales guys (and girls) in the title but, your security has to be easy enough to use and understand that anyone in the organization can use it, no matter their level of security training. I have heard multiple reports from our customers in healthcare that have implemented comprehensive and costly software to help keep their PHI data safe on all devices and across all networks. The problem?
Image
IT Security

SAO vs. SIEM: Not Enemies, But a Security Defending Duo

May 15, 2018
Security Information and Event Management (SIEM) solutions have been with us for more than a decade. Recently, Security Automation and Orchestration (SAO) products have moved into the spotlight, causing many to wonder if the days of SIEM are numbered. However, as both products continue to evolve, it’s becoming clear that it is less a matter of SAO vs. SIEM, but instead SAO and SIEM.
Image
Cloud Security

How SIEM Protects Cloud Servers

May 6, 2018
IT professionals everywhere are taking a good look at security information and event management (SIEM) applications to help them oversee their vast technology infrastructures. What once were IT stacks housed solely on premises now include increased expansion into cloud repositories, resulting in the prevalence of hybrid approaches. The ability to monitor security across these wide-reaching environments has never been harder—or more paramount.

Introducing Access Assurance Suite 9.1

May 2, 2018
Today, we are thrilled to announce the next step in our Identity Governance and Administration journey, the release of Core Access Assurance Suite 9.1. While not a major release, AAS 9.1 includes updated UX and UI changes which show our continued commitment to visualizing IGA. The Access Assurance Suite 9.1 release follows a visual-first approach, with a new user interface for managing access and a new menu style which provides more space and clarity.
Image
IT Security

Assess the Effectiveness of Your Security Controls with Penetration Testing

Apr 23, 2018
It’s important for all organizations to periodically assess and test security vulnerabilities, to better evaluate risk and be ready to detect, prevent and respond to threats as they happen. Vulnerability assessments, penetration tests and Red Teams help you identify and prioritize security risks, which also improves your overall security posture. Gartner recently released a detailed research report covering the use of penetration testing and Red Teams. The report describes the processes and suggests ways that organizations can use them to reduce risk.
Image
Cloud Security

Cloud Misconfiguration and the Curse of the Inadvertent Employee

Apr 19, 2018
We all know that to err is human. The problem is some mistakes are an order of magnitude larger than others. If you forget to buy apples at the store, that’s unfortunate. But if you forget to lock down your cloud server with the proper security controls and hackers gain entry… That’s a problem that could cost your business dearly.

Ransomware Hits the City of Atlanta

Apr 19, 2018
On March 22, the city of Atlanta was brought to its knees by a ransomware attack. CNN reported that the malicious incident affected at least five of the city’s municipal departments, effectively locking down key functions for the police, courts, and more. The attackers asked for the $51,000 ransom to be paid in the bitcoin cryptocurrency.

What Tesla’s Cryptojack Attack Means for the Rest of Us

Apr 17, 2018
In February, Fortune, Wired, and other media outlets reported that hackers worked their way into automaker Tesla’s Amazon Web Services (AWS®) cloud account to mine for cryptocurrency. These so-called “cryptojacking” attacks are on the rise in concert with escalating cryptocurrency prices, prompting hackers to gain access to company networks to generate these virtual forms of tender.

The Latest Exploits Shipped to Core Impact 18.1

Apr 1, 2018
Summary for all of the exploits and updates shipped to Core Impact 18.1 since its release (on Feb 14th): 14 Updates Overall 3 Remote Exploits 5 Client-Side Exploits 3 Local Exploits 3 Product Updates Here is the list of published updates: