Our Blog

RSS

This month’s Patch Tuesday takes on a new look and a lot of changes for IT departments going forward. Beginning today, October 11, Microsoft has fully implemented its "Windows as a service" cumulative update program. This program structure has currently been in place…

Read More

This last week Core Security organized and ran a Capture the Flag hacking challenge for a group of high school students in New York City. We use a fictional health care provider’s network for these events, that’s based on our real world experiences…

Read More

Ineffective password management can be a significant burden to most organizations, resulting in increased costs and security risks. In order to ensure the security of your network, you set rules around password creation including the use of characters, symbols, minimum lengths and more. You’ve…

Read More

  Did you know that the top 10 vulnerabilities account for 85% of exploits? Do you know if any of these vulnerabilities lie in your network? You can with Penetration-Testing. Here are 10 other reasons you should be pen-testing your network.     Want to know what a pen-test…

Read More

How many devices do you have within your reach right now? How many emails did you answer on your cell phone, work or personal, after you got home last night? Did you watch the debate this week? How? For the first time there were live…

Read More

I spent the weekend with one of the coolest groups of security professionals I’ve ever had the privilege to meet at Derbycon. I highly recommend it. It’s always great to get into the middle of a massive exchange of ideas, because you always…

Read More

I think it’s only fitting as we come upon October and the month of scary things to talk about what healthcare providers have been dreading for some time now… the HIPAA audits are coming. According to the Department of Health and Human Services, the…

Read More

A few weeks ago, we talked about grabbing hashes and cracking them. What if I told you that in most networks these days, you don’t have to bother with cracking the passwords? That’s right! With most networks with Active Directory, you can use…

Read More

The Internet of Things. What started as a buzzword and visions of becoming George Jetson with our refrigerators quickly telling our phones that we are out of milk only to have our phones remind us while we drive by the grocery store. While…

Read More

Are you using penetration testing in your cyber-security tool kit? Why not?! Penetration testing, or pen-testing, is one of the most important tools to not only find the holes in your network but to prioritize them for remediation. Keep reading for the 10…

Read More