Cyber Security Awareness and Vulnerabilities Blog

Much like how I complain that I’m not losing weight - even though my treadmill has become a clothing rack- security only works if you use it. And, yes, I know I picked on the sales guys (and girls) in the title but,…

Read More

Today, we are thrilled to announce the next step in our Identity Governance and Administration journey, the release of Core Access Assurance Suite 9.1. While not a major release, AAS 9.1 includes updated UX and UI changes which show our continued commitment to…

Read More

It’s important for all organizations to periodically assess and test security vulnerabilities, to better evaluate risk and be ready to detect, prevent and respond to threats as they happen. Vulnerability assessments, penetration tests and Red Teams help you identify and prioritize security risks,…

Read More

The Impacts 18.1 release last month brought a ton of streamlined enhancements and new capabilities to the client-side vector in general, and phishing in particular. To be clear on terms, I consider phishing to be inducing a target to follow a link presented…

Read More

When first reading this article, the thought of, “Well it’s about time, identity has a place at RSA” quickly came to mind. Even if you don’t agree with everything listed, some items mentioned are mere table stakes for a new way of thinking about…

Read More

We all know that there are clear problems in the industry when it comes to role design and entitlement certification. Problems like: Lack of visibility: Most entitlements and user access logs are kept in spreadsheets, whether on their machine or in an online tool,…

Read More

It is our mission to continue to produce the most effective and efficient security products and services on the market. Today, I am happy to announce the release of Core Impact 18.1, our market leading penetration testing solution – where we put the…

Read More

"I heard on the news about how some sites and mobile apps are vulnerable to Man-in-the-Middle attacks.  What is a Man-In-The-Middle Attack, how does it work, and how can I protect myself?" Man-in-the-Middle (MitM) attacks are basically one website stepping in-between you and a…

Read More

It’s the start of a new year. A time where it’s normal for businesses to look at what worked, what didn’t and what to start or stop. With those conversations happening, it’s just as important to discuss this from a security perspective. Looking back,…

Read More

In today’s connected world there are too many devices and too many networks to protect and cyber criminals are more sophisticated than ever. The 2017 threat landscape proved that no one is immune to cyber attacks. But can we take the cybersecurity mistakes…

Read More