Our Blog

RSS

As you heard from Bobby last week, it is that special time of the year, Black Hat, when all of our friends are gathered together in Vegas to see just what hacks, exploits, tips and tricks there are for us to be concerned…

Read More

  By: Venkat Rajaji, SVP Marketing Day after day we see the evidence of an increased number of breaches (ie. The DNC email hack) and as a Privileged Account Management (PAM) provider, we are seeing a similar increase in requests for proposals on our Core…

Read More

We are pleased to announce the official release of Core Impact Pro 2016 R1.1. More than 83 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team…

Read More

It’s that time of year, again for what those of us in the industry jokingly call Security Summer Camp. To be honest, I’m *still* not entirely sure if I’ve recovered completely from the last time. Next week in Las Vegas, the Blackhat USA,…

Read More

A week ago I pontificated at the world about the Pokémon Go! craze. It’s been an interesting study in human behavior, and not all of it good. First off, the concerns about the overreach on information have been alleviated by updates. As I…

Read More

Did you know that in 2015 the average number of records stolen in the U.S. was 29,611? Is your company at risk for a breach? Come meet us at Black Hat 2016 (Booth #732) and find out how to be a Cyber-Security Superhero in your…

Read More

Driving around the last few days, I’ve seen more than the usual numbers of people blundering unaware into traffic. Enough that I had to do a quick check for signs of the zombie apocalypse. Alas, it is not. It’s a new game. A…

Read More

You may think that July is a little early to publish a “best of” blog but we thought, why wait? Our Core Labs team is busy working on new vulnerabilities, patches, and exploits but we wanted to take a minute and review all…

Read More

The term "privileged access" has become a hot topic as of late. For the first time in history, the Verizon Data Breach Investigations Report actually included privileged access as its own section in the report with some not so surprising results. Couple of…

Read More

6 Realities for Effectively Managing Privileged Accounts Big or small, every organization has accounts that hold ‘keys to the kingdom’ credentials. Almost every account holds some level of privilege that can potentially be compromised, resulting in not only financial, but reputational damage. Looking…

Read More