Our Blog

RSS

We are excited to announce that Core Vulnerability Insight 5.5 is now available for general release! Core Vulnerability Insight is meant to enhance your vulnerability management process. Massive amounts of vulnerabilities are generated as a result of both network and web scanning activities…

Read More

I’m in the United Kingdom this week talking to some of Core’s customers and partners before attending Blackhat Europe. Since I got into London early on Sunday morning, I decided to take a bit of a field trip. In actuality, it could better…

Read More

Dot Com Bubble Burst In the early 2000s, the once promising Internet bubble came crashing down causing the economy to go into a tailspin and recession. At the time, many pundits analyzed this and thought that the Internet was just a fad and…

Read More

“There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information. What we see and hear, how we work, what we think... it's all about the information!" – Sneakers…

Read More

Core Security is excited to announce our newest release - Access Insight 9.2! The most exciting part of this release is the added ability to support Segregation of Duties (SoD) which identifies conflicts between roles or entitlements within an organization. Access Insight 9.2…

Read More

We are pleased to announce the official release of Core Impact Pro 2016 R1.2. More than 46 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team…

Read More

You can’t throw a digital rock in the IT security blog space without hitting an article concerning the risks and consequences related to password compromise. This attention is well-placed given the numerous high profile cases of data theft and reputational losses that can be traced…

Read More

This month’s Patch Tuesday takes on a new look and a lot of changes for IT departments going forward. Beginning today, October 11, Microsoft has fully implemented its "Windows as a service" cumulative update program. This program structure has currently been in place…

Read More

This last week Core Security organized and ran a Capture the Flag hacking challenge for a group of high school students in New York City. We use a fictional health care provider’s network for these events, that’s based on our real world experiences…

Read More

Ineffective password management can be a significant burden to most organizations, resulting in increased costs and security risks. In order to ensure the security of your network, you set rules around password creation including the use of characters, symbols, minimum lengths and more. You’ve…

Read More