Blog

Blog

Security Answers in Plain English: What is a Man-in-the-Middle Attack?

"I heard on the news about how some sites and mobile apps are vulnerable to Man-in-the-Middle attacks. What is a Man-In-The-Middle Attack, how does it work, and how can I protect myself?" Man-in-the-Middle (MitM) attacks are basically one website stepping in-between you and a legitimate website so that whatever you do on the legitimate website can be seen and stolen by the attacker who owns the...
Blog

New Release - Core Impact 18.1

It is our mission to continue to produce the most effective and efficient security products and services on the market. Today, I am happy to announce the release of Core Impact 18.1, our market leading penetration testing solution – where we put the focus on enabling user-testing and social engineering. With this release, we’ve put the focus back on the user, or “client-side” testing, as email is...
Blog

Customizable Reports with Core Impact

Streamline Penetration Testing Documentation with Flexible, Automated ReportsCore Impact's robust reporting capabilities have evolved significantly in the last few years, empowering penetration testers and security professionals to generate customized reports that align with specific organizational needs and compliance requirements. With the latest version and ongoing enhancements, Core Impact...
Blog

The Latest Exploits Shipped to Core Impact 18.1

Summary for all of the exploits and updates shipped to Core Impact 18.1 since its release (on Feb 14th): 14 Updates Overall 3 Remote Exploits 5 Client-Side Exploits 3 Local Exploits 3 Product Updates Here is the list of published updates: Remote Exploits: Symantec Messaging Gateway performRestore OS Command Injection Exploit IBM Informix Open Admin Tool SOAP welcomeServer PHP Remote...
Blog

Assess the Effectiveness of Your Security Controls with Penetration Testing

It’s important for all organizations to periodically assess and test security vulnerabilities, to better evaluate risk and be ready to detect, prevent and respond to threats as they happen. Vulnerability assessments, penetration tests and Red Teams help you identify and prioritize security risks, which also improves your overall security posture. Gartner recently released a detailed research...
Blog

Introducing Access Assurance Suite 9.1

Today, we are thrilled to announce the next step in our Identity Governance and Administration journey, the release of Core Access Assurance Suite 9.1. While not a major release, AAS 9.1 includes updated UX and UI changes which show our continued commitment to visualizing IGA. The Access Assurance Suite 9.1 release follows a visual-first approach, with a new user interface for managing access and...
Blog

Security So Easy, A Sales Guy Can Do It

Much like how I complain that I’m not losing weight - even though my treadmill has become a clothing rack- security only works if you use it. And, yes, I know I picked on the sales guys (and girls) in the title but, your security has to be easy enough to use and understand that anyone in the organization can use it, no matter their level of security training. I have heard multiple reports from our...
Blog

How to Pen-Test with Core Impact

When conducting a penetration test, most testers will develop some type of process, and repeat that same process on every engagement. As I think through the basics of penetration testing, I believe that process can be broken up into six steps. Now, I’m not saying every tester follows every step or performs these steps in this exact order, however, this is a pretty good process to follow. Let’s...
Blog

How to Solve the Top Three Struggles of Identity Governance and Administration

Identity Governance and Administration (IGA) is a complex and growing set of solutions that are put in place to help your organization stay compliant with government or industry regulations and, perhaps more importantly, help secure your organization. However, with every new solution, there are a host of new problems. In working with our IGA customers, we keep seeing certain problems emerge so,...