Blog

Blog

How to Leverage a Comprehensive Privileged Access Management Security Approach

Effectively managing privileged access has become a top priority for many organizations seeking to protect their data and systems from unauthorized users. That’s because inappropriate access can expose valuable organizational data, compromise sensitive information, and adversely affect system reliability. The latest Verizon Data Breach Investigations Report found that the majority of data breaches...
Blog

How Financial Services Organizations Can Mitigate Their Top Identity-Related Access Risks

Financial services organizations face numerous challenges in a constantly changing landscape. With increased cybersecurity threats, intensified regulatory requirements, an acceleration of digital transformation, large-scale mergers and acquisitions, and growing customer expectations, these organizations must pursue strategies and programs that mitigate risks, safeguard valuable data, and protect...
Blog

Interview with a Healthcare Security Expert: William "Buddy" Gillespie, HCISPP

In November we started a wonderful webinar series with industry leader William "Buddy" Gillespie, HCISPP and we introduced that series with a sit down interview. Yesterday, we concluded the series with a webinar titled "Healthcare 2020: Focus on the Future". While the webinar series may be over, our partnership with Buddy will continue and we would like to continue to showcase his knowledge...
Blog

10 Reasons to Pen-Test Your Network

Are you using penetration testing in your cyber-security tool kit? Why not?! Penetration testing, or pen-testing, is one of the most important tools to not only find the holes in your network but to prioritize them for remediation. Keep reading for the 10 reasons you should be pen-testing. 1. Real-world Experience Pen-tests give you real world experience in dealing with an attack. Penetration...
Blog

Core Impact Pro 2016 R1.2 Now Available

We are pleased to announce the official release of Core Impact Pro 2016 R1.2. More than 46 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team has been working on several privilege escalations, a number of remote exploits for widely deployed software, and numerous enhancements. Core...
Blog

The New Rules of Penetration Testing

In the past, penetration testing was a fancy name for breaking through a network firewall. However, as technology advances and breaches become even more dangerous – costing an average of £2.53 million, according to research sponsored by IBM – security executives need to revisit pen testing to make sure it is an ongoing practice in their defense arsenals. By far, organizations who regularly see...
Blog

How to Prepare for a DDoS Attack

“There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information. What we see and hear, how we work, what we think... it's all about the information!" – Sneakers Last week, another massive Distributed Denial of Service (DDoS) attack disrupted large swaths of the internet effecting both direct targets and causing collateral...
Blog

How to Spot High Risk Accounts in Your Organization

The Danger of Stolen or Misused Credentials According to the Verizon Data Breach Report over 80% of breaches were due to stolen or misused credentials. This shows us that our access credentials are more valuable than ever which means that being able to locate our high risk access accounts has become more important than ever. Do you know who has the administrative privileges to your key...
Blog

Core Impact 2016 Pro R1.1 Now Available

We are pleased to announce the official release of Core Impact Pro 2016 R1.1. More than 83 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team has been working on several privilege escalations, a number of remote exploits for widely deployed software, and numerous enhancements. This...
Blog

5 Embarrassing Mistakes Found in Penetration Tests

It is that special time of the year, Black Hat, when all of our friends are gathered together in Vegas to see just what hacks, exploits, tips and tricks there are for us to be concerned about. As a cyber-security specialist, it’s the most wonderful time of the year. However, for consumers and business owners, it is the reminder that what you thought was safely tucked away is actually only a moment...
Blog

Why Outsourcing Security Isn’t Something to be Scared Of

No matter what you call them: threats, weaknesses, risks or vulnerabilities, they’re out there. Are you ready to handle them? Do you have a team internally dedicated to conducting pen-tests regularly? Are the people you’ve hired trained and experienced in conducting pen-tests or seeking out weaknesses in your system? How about fixing or eradicating issues before they actually become problems? ...
Blog

How to Increase Password Security with Mobile Reset

Ineffective password management can be a significant burden to most organizations, resulting in increased costs and security risks. In order to ensure the security of your network, you set rules around password creation including the use of characters, symbols, minimum lengths and more. You’ve restricted the use of old passwords and instituted a process for the passwords to be changed at regular...
Blog

Tips to Better Understand Cyber-Security

2016 really made a name for cyber-security. Now let’s make 2017 the year of executing strong cybersecurity plans. In order to fight the war online, you first need to understand what it is you are actually fighting. You hear the buzzwords such as “cybersecurity,” “pen-testing” and “IoT” – but do you know the full scope of what they really mean? Where to Start As with anything, it starts with...
Blog

How to Create a Company Culture of Security

Cyber-security firms are consistently talking about securing the Internet of Things, analyzing the latest hack or trying to sell you on the latest and greatest tool. Oftentimes, this makes you look at the newest security software to put in place (which we recommend you do) or increase the number of pen-tests to ensure your systems are in optimal condition. What you may be missing is the most...
Blog

Security for Any Business Size

Let’s not fall victim to just talking about securing our businesses or people without putting action behind it. Cyber-security has grown to be a hot topic as technology advancements continue and after many cyber-attacks, breaches and panic in 2016. When hearing details about the attacks that happened to Target, Yahoo or Anthem, you can’t help but wonder if you could be next. We are not promising...
Blog

Securing Access in an Always-Connected World

How many devices do you have within your reach right now? How many emails did you answer on your cell phone, work or personal, after you got home last night? Did you watch the debate this week? How? For the first time there were live streaming versions of the debate on television, Facebook, Twitter, and on the websites of too many media outlets to count. Our lives have become insanely...
Blog

8 Tips for Penetration Testing

You think that you're safe, that your network is secure, that your firewalls are protecting you...but how will you know if you don't test it? A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. You may have also hear the term "Red Hat" or "White Hat" when it comes to testing because, while they are trying to...
Blog

Core Ready to Put On its Black Hat

Core Security has more going on at Black Hat USA in 2009 than ever before, with the concept of helping customers improve their overall security standing at the center of everything we plan to do. It’s hard to believe that an entire year has passed since the ethical hacking community last convened amid the neon lights and desert sands of Las Vegas for the annual Black Hat convention, but here we...