Cyber Security Awareness and Vulnerabilities Blog

RSS

Patience is a virtue … and no one knows patience better than those who bought tickets and attended ShmooCon this year. Even with the addition of yet another Potter; getting through a snow-ridden storm on the way TO the con (or 2 storms…

Read More

The Elephant in the Cloud In my experience, I’ve seen organizational leaders approach cloud computing from three different angles best summarized by the following questions: A.  How can I help my customers take advantage of cloud computing? B.  How can I deliver a better product/service using…

Read More

It’s no secret that cyberspace is growing more hostile, with increased criminal activity and regime-driven intelligence activity.  When the CSIS Commission first published its Report on Cybersecurity for the 44th Presidency two years ago, cybersecurity didn’t appear to be a priority for many…

Read More

I wouldn’t describe myself as a hoarder, but I am generally quite reluctant to throw things away. That old floppy disk on my shelf is a nostalgic reminder of how long it would take to install Windows NT 3.1 in my first proper…

Read More

Here we are on the cusp of another ShmooCon, and I’m really excited to get down to DC. Since I can’t stop thinking about it, I figured I’d write about it – and give you a sneak peek at some cool things my…

Read More

"No man is an island, entire of itself; every man is a piece of the continent, a part of the main." - John Donne Similarly, no tool is an island, entire of itself. Any pen tester using only one tool is doing themselves and…

Read More

Oftentimes after using Network Information Gathering, we are still left with a number of devices that may reflect an "Unknown" OS. Currently Core Impact does not identify devices such as the iPhone, iPad, or iPod Touch, but that doesn't mean that we can't…

Read More

When I first arrived here almost three years ago, the most exciting aspect of taking on leadership of Core was knowing that the company I was joining wasn’t just a clear leader in its established market, but that it also had the vision…

Read More

Once again, we are proud and excited to introduce a new release: CORE IMPACT Pro v11. This is another example of Core continuing on our strategy of providing customers with product updates on three fronts: security breadth, security depth, and features and functionality.…

Read More

Reaching into the history books to find just the right quote to encapsulate why the process of proactive security assessment makes far more sense than simply throwing up new IT defenses or creating additional choke points aimed at stopping individual classes of threats…

Read More