Vulnerability Management

Learn how to unify and streamline network, endpoint and web vulnerability management initiatives enterprise-wide.

We are pleased to announce the official release of Core Impact Pro 2014 R1.4. More than 30 updates have been added, and they are all are available through the regular update channel for all Core Impact customers who have upgraded to the latest…

Read More

From Andy Rappaport, Chief Architect at Core Security. We asked the Black Hat crowd a few questions about the state of information security. Here's my take on the findings! Your security team wants more money. No surprise here. Everyone wants a bigger…

Read More

The Payment Card Industry Data Security Standard “12 Step program" was not created in a vacuum, or to "make work" for organizations.   Many groups across a variety of industries must follow these requirements, but the ones who are doing it the right, are…

Read More

When you think of open source systems available over the ‘net what do you think of?   Apache Tomcat?  Emacs?    How about the F-35 Joint Strike Fighter or the U.S Navy’s Littoral Combat Ship.   Well the last two aren’t technically open source, but according…

Read More

Core Insight is the only integrated vulnerability management solution to give organizations the ability to continuously correlate, evaluate, and anticipate their business risks. Used by Fortune 500 firms and other security-conscious organizations world-wide, Insight empowers executives and security leaders to make informed choices…

Read More

Every day, we read about cyber-attacks and data breaches, incidents that represent in many cases a disaster for private companies and governments. Technology plays a significant role in our lives; every component that surrounds us runs a piece of software that could be…

Read More

Ten years ago, Internet worms, e-mail spam and opportunistic hacks were the biggest threats to your corporate network. In response, a stateful inspection firewall, desktop antivirus software and spam filtering could reasonably be expected keep your corporate network protected. Times have changed. Today,…

Read More

The greatest risk your organization can take in the face of modern threats is to be complacent. It’s no longer acceptable to merely react to incidents and threats. Instead, your organization has to go on the offensive: pre-empting attacks rather than waiting to…

Read More

As a security researcher and member of the CORE Security Consulting Services team, and close partner with CORE Labs here in Buenos Aires, I need to perform security analysis of complex enterprise IT environments with software installations from any number of vendors. These…

Read More

The fairy tale is over folks. The belief (and at times, the stated position) that Apple’s Macs were immune to attacks and therefore did not need anti-virus or other defenses has finally been shattered. Those of us in the security industry have been…

Read More