Our Blog

RSS

As many of our followers will already know, it was announced by scanner maker Rapid7 today that they will acquire Metasploit LLC, the IP for the Metasploit penetration testing framework, and hire Metasploit creator H.D. Moore and at least one other member of…

Read More

Core Security Technologies is hard at work developing a new set of enterprise security testing solutions that will provide organizations with a previously unavailable level of insight into their overall IT security risk posture.

Read More

One of Core Security's most dedicated customers offers his opinion on why penetration testing is so valuable when used in cooperation with vulnerability scanners and other proactive security practices.

Read More

Results from a poll taken during one of our recent webcasts illustrate how cybercrime and compliance efforts are driving significant interest in internal penetration testing.

Read More

Core CTO Ivan Arce has addressed the challenge of accurately predicting the future of IT risk management, and offered his best theories on how to do so, in a new blog post on CSO.com

Read More

One CORE IMPACT Pro customer recounts his initial experiences in testing his assets against automated penetration testing software.

Read More

Cloud computing offers a number of powerful benefits, but also introduces significant risks.

Read More

Albert Gonzalez' attacks on companies like Heartland Data highlight the true value of proactively testing IT security controls and validating vulnerabilities using CORE IMPACT Pro.

Read More

The process of testing IT security mechanisms to measure and validate their efficacy is a nascent idea, but we're already getting there.

Read More

Sometimes when conducting a test, you really don't want your traffic to be seen, and using a SOCKS proxy is one good way to do just that.

Read More