Our Blog

RSS

Tom Kellermann, Core's Vice President of Security Awareness, had the honor of testifying before a Congressional Committee on issues of national cyber-security.

Read More

Bob Maley, CISO for the Commonwealth of PA, has made some extrodinary progress in managing IT security risk via the adoption of automated penetration testing, as evidenced by his recent speech at the RSA Conference 2009.

Read More

Melissa Hathaway's presentation at RSA Conference 2009 appeared to embrace a more risk-based approach to enterprise security, which should include heavy doses of vulnerability management work.

Read More

The annual RSA conference is well underway, and the first day had plenty to talk about.

Read More

The annual RSA Conference will go off next week and Core will be there, hosting several presentations and meeting with our customers and partners to spread the doctrine of automated penetration testing.

Read More

Welcome to Core Security's new company blog. We hope to keep you up-to-date with everything that we're doing as a business, and lend some additional perspective to important conversations that affect our industry.

Read More

People are talking about new partnerships aimed at marrying penetration testing with vulnerability scanners. And while this may be a new concept for some, we here at Core have been focused on this type of integration for years.

Read More

There was a time when organizations that experienced data breach incidents might have been able to get away with pleading ignorance, but that time passed long ago.

Read More

Vulnerability management can be a complex process to embrace. That's why organizations attempting to get further involved in the work should always have a comprehensive game plan.

Read More

Nearly every IT security company sees its ultimate goal as making the electronic world a safer place to live and do business. At Core, we embrace this pursuit in a truly unique and powerful manner.

Read More