Blog

Blog

Horrible Mistakes You're Making With Pen-Testing Pt. 2

We’ve let you in on some of the not-so-secret mistakes people make with pen-tests last week in "Horrible Mistakes You're Making With Pen-Testing Pt. 1" and we’re continuing with that theme today. There are more potential mistakes and we want to make sure you’re aware of them in order make your pen-tests successful. Read on and stay tuned to see just how many there actually are!Horrible Mistake #3:...
Blog

Horrible Mistakes You're Making With Pen-Testing Pt. 1

For some, running a pen test is merely something to do to pass a compliance check for the year. However, there are many more benefits than just adhering to a precedent set out before you. If done correctly – correctly being the main emphasis here – you should already know of the added benefits pen-tests have towards maintaining a healthy security posture. If you feel like you could improve even...
Blog

Thoughts from Black Hat and Defcon

Getting home from what we affectionately call Security Summer Camp is almost as much of an adventure as attending the conferences. Getting caught in the Deltapocalypse on the way home just added to the fun. If you want a real challenge, try seeing your way onto earlier flights during a system-wide meltdown of a major legacy carrier.
Blog

Obligatory Java “zero-day” Blog Post

When my mother emails to ask if she should be worried about the Java vulnerability the saw on the news, you know a security issue has gone mainstream. And it seems you cannot be a security company without having a blog warning of the dangers presented by the Java exploit.
Blog

When to Use a Pen Test Versus Vulnerability Scan

Penetration testing versus vulnerability scanning. It all sounds the same or does the same thing, doesn’t it? Mistakenly, these terms are often used interchangeably even though there are some fundamental differences. Here we will distinguish the two and help you see what value each could bring to your business. What to Expect in a Pen Test A penetration tester has the goal of getting through...
Blog

A New Way of Thinking About Vulnerability Management

How do you look at vulnerability management? We’ve seen several blogs on this topic in the past month and even a webinar with one of our security consultants but the truth is that everyone looks at this issue differently. From scanning and assessments to prioritization and patching, vulnerability management is a lot of different things but it is not and never should be seen as: Just a list of...
Blog

4 Steps to Building a Vulnerability Management Program

Day after day we hear stories of companies being breached because of vulnerabilities in their systems. While some of these vulnerabilities may be new, the majority of breaches are caused by vulnerabilities that have had a patch available for weeks, months, even years but are left unpatched. If you know that there are vulnerabilities on your network, why wouldn’t you patch them immediately? Simply...
Blog

Navigating Your Vulnerability Management Program

OK, I admit it. I use GPS to navigate some routes I’ve driven at least a hundred times. It’s a relief to hear that robotic voice helping me with every single turn on my way home. Here at Core, we asked-how can we make the vulnerability management journey easier for organizations to traverse to reduce the risk of a potential security breach? Ah, yes, a roadmap of sorts to follow to ensure a...
Blog

How To Manage the Pen Testing Skills Shortage

According to the 2023 Pen Testing Report, 94% of cybersecurity professionals surveyed felt that penetration testing was somewhat important or important to their organization’s security posture, with 93% also reporting that penetration testing was at least somewhat important to their compliance initiatives. Despite this importance, 55% of cybersecurity professionals reported their organization hasn...