Uncategorized

I read somewhere that your security is only as good as the measures you use to test it, which makes sense, and which explains the shift we have seen in the past few years in the security market. Penetration testing, aka ethical hacking,…

Read More

privileged-access.png

Bridge at night with lights shining

The term "privileged access" has become a hot topic as of late. For the first time in history, the Verizon Data Breach Investigations Report actually included privileged access as its own section in the report with some not so surprising results. Couple of…

Read More

Big or small, every organization has accounts that hold ‘keys to the kingdom’ credentials. Almost every account holds some level of privilege that can potentially be compromised, resulting in not only financial, but reputational damage. Looking at top patterns in the 2016 Verizon…

Read More

You think that you're safe, that your network is secure, that your firewalls are protecting you...but how will you know if you don't test it? A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely…

Read More

Hi, After Enrique Elias Nissim (@kiqueNissim) and I presented "Getting Physical: Extreme abuse of Intel based Paging Systems" at CanSecWest2016 (slides here), I decided to write a series of blog posts explaining in detail what we presented and show what we couldn't in a…

Read More

The role of the healthcare CISO has expanded exponentially since the HITECH Act of 2009.  CISOs were traditionally charged with the responsibility to maintain the IT environment consisting of applications and infrastructure.  Today they are taking on an expanded organizational role consisting of…

Read More

What does "Compliance" mean to you?   Compliance is a word that we hear a lot in our business. Broadly, it is defined as "the action or fact of complying with a wish or command." If that seems like a simple definition, it's because…

Read More

We are pleased to announce the official release of Core Impact Pro 2015 R1.4. More than 36 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version.…

Read More

Threat intelligence is a company’s worst nightmare which pushes cyber security and risk management to the top of the list for standard operating procedures (SOP). Traditional risk management is a thing of the past, and corporations have begun investing in top-notch security solutions for their various…

Read More

We are pleased to announce the official release of Core Impact Pro 2015 R1.3 today, January 25. More than 27 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the…

Read More