Uncategorized

Enterprise security professionals gathered last week in Atlanta, GA to confront the challenge of being under constant attack by bad actors. At CONNECT 2017, leaders from SecureAuth and Core Security presented a vision for securing the modern enterprise from criminals, hacktivists, and state-sponsored…

Read More

  Did you know that the top 10 vulnerabilities account for 85% of exploits? Do you know if any of these vulnerabilities lie in your network? You can with Penetration-Testing. Here are 10 other reasons you should be pen-testing your network.     Want to know what a pen-test…

Read More

I read somewhere that your security is only as good as the measures you use to test it, which makes sense, and which explains the shift we have seen in the past few years in the security market. Penetration testing, aka ethical hacking,…

Read More

Did you know that in 2015 the average number of records stolen in the U.S. was 29,611? Is your company at risk for a breach? Come meet us at Black Hat 2016 (Booth #732) and find out how to be a Cyber-Security Superhero in your…

Read More

The term "privileged access" has become a hot topic as of late. For the first time in history, the Verizon Data Breach Investigations Report actually included privileged access as its own section in the report with some not so surprising results. Couple of…

Read More

6 Realities for Effectively Managing Privileged Accounts Big or small, every organization has accounts that hold ‘keys to the kingdom’ credentials. Almost every account holds some level of privilege that can potentially be compromised, resulting in not only financial, but reputational damage. Looking…

Read More

We have some very exciting news to share with you today. Effective immediately, the companies you have known as Courion, Core Security, SecureReset and Bay 31 are now newly branded as Core Security. For more on our newly rebranded company please tune in to…

Read More

You think that you're safe, that your network is secure, that your firewalls are protecting you - but how will you know if you don't test it? A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure…

Read More

Hi, After Enrique Elias Nissim (@kiqueNissim) and I presented "Getting Physical: Extreme abuse of Intel based Paging Systems" at CanSecWest2016 (slides here), I decided to write a series of blog posts explaining in detail what we presented and show what we couldn't in a full…

Read More

The role of the healthcare CISO has expanded exponentially since the HITECH Act of 2009.  CISOs were traditionally charged with the responsibility to maintain the IT environment consisting of applications and infrastructure.  Today they are taking on an expanded organizational role consisting of…

Read More