Cyber Security Awareness and Vulnerabilities Blog

One CORE IMPACT Pro customer recounts his initial experiences in testing his assets against automated penetration testing software.

Read More

Cloud computing offers a number of powerful benefits, but also introduces significant risks.

Read More

Albert Gonzalez' attacks on companies like Heartland Data highlight the true value of proactively testing IT security controls and validating vulnerabilities using CORE IMPACT Pro.

Read More

Sometimes when conducting a test, you really don't want your traffic to be seen, and using a SOCKS proxy is one good way to do just that.

Read More

To affect truly meaningful change in the arena of global cybersecurity, the U.S. must recognize the need to partner with influential stakeholders who can help foster the cooperative worldwide approach necessary to overcome today's existing hurdles.

Read More

Core Security CTO Ivan Arce responds to claims by Absolute Software that the research published by our CoreLabs experts at the Black Hat USA 2009 conference was not accurate, and that they weren't given a sufficient chance to respond to the findings prior to the given presentation.

Read More

Penetration testing is one of the practices that energy industry companies must employ to improve their overall IT security standing.

Read More

Don't miss out on CORE IMPACT Pro's modules when conducting tests; they're very effective, and also a heck of a lot of fun!

Read More

Black Hat USA 2010 proved to be every bit as exciting and successful for Core Security as we had hoped and expected it would be going in.

Read More

There's a bounty of compelling content about penetration testing being presented at this years Black Hat USA conference and trade show.

Read More