Resources

Video

How to Solve the Top 3 Struggles with Identity Governance and Administration (IGA)

Identity Governance and Administration solutions are more than the newest security buzzword, they are integral solutions that work with your Identity and Access Management solutions to keep your network safe. In this webinar, our product solutions team explains how to solve, the three biggest struggles they see with IGA programs such as: Dealing with third party contractors Struggling with...
Blog

Jingle Bells, Retail Sells, Attacks Are on the Way (Part 1)

It’s that time of year where retail booms as the world goes shopping for gifts during the holiday season. It’s a time for retailers to shine. But, it’s also the time where retailers are most vulnerable to security risks as bad actors gear up to target them. In this two part series, we will discuss things retailers should consider this holiday season to better secure themselves from attacks and to...
Blog

How to Deal with Changing Financial Cybersecurity Regulations

Late last year the New York State of Financial Services (DFS) announced that New York would be proposing a "first in the nation" rule on cyber-security to go into effect on March 1, 2017 which would impact any bank, insurance company and anyone else covered by DFS. The rule requires any regulated company design a cybersecurity program that assesses its risks to ensure the safety and soundness of...
Video

How to Take Your Vulnerability Management Program to the Next Level

Managing security vulnerabilities is no easy task: identifying, classifying, remediating, and mitigating weaknesses in the IT infrastructure is a continuous process that has only grown more challenging with an increasing number of attacks. Most organizations have the fundamentals in place: running regular vulnerability scans, establishing basic prioritization methods, having a patching process,...
Video

8 Ways to Tackle the Biggest Access-Related Challenges in Financial Services

Financial services organizations today face extraordinary challenges in a dynamic, complex landscape. During the last two decades, the financial services sector has seen everything from increasing cybersecurity threats, data breaches, and cyberattacks to intensified regulatory compliance, an acceleration of digital transformation, and the pressure to increase operational efficiencies and decrease...
Blog

5 Most Notable New Features in Core Impact 20.1

We are so excited about our latest release of Core Impact. Version 20.1 was fueled largely by the valuable and genuine feedback our customers have shared with us. This release was jam packed with new features, including several new additions that offer added convenience and increased usability. To recap, we thought it would be helpful to highlight the top 5: 1. Flexible Licensing Core Impact now...
Ecourse

Conducting Phishing Attacks in Core Impact

There are endless possibilities when it comes to conducting phishing campaigns using Core Impact. These training videos are designed to get you started and provide ideas on how you can set up your phishing campaigns.
Ecourse

Core Impact Advanced Techniques

This series is designed to provide tips and tricks for penetration testers to conduct as they become more advanced users in Core Impact. From injecting agents to conducting a golden ticket attack, this series includes advanced techniques that can help you understand where your organization is most vulnerable. ...
Ecourse

Using Core Impact with PowerShell Empire

This video discusses the integration between Core Impact and PowerShell Empire and how you can use these two tools together. (function(t,e,s,n){var o,a,c;t.SMCX=t.SMCX||[],e.getElementById(n)||(o=e.getElementsByTagName(s),a=o[o.length-1],c=e.createElement(s),c.type="text/javascript",c.async=!0,c.id=n,c.src="https://widget.surveymonkey.com/collect/website/js/tRaiETqnLgj758hTBazgd...
Ecourse

Getting Started with Core Impact

Get up and running quickly with this training series designed to provide you with an overview of the Core Impact penetration testing software interface and functionality. ...
Blog

Getting Inside the Mind of an Attacker: Why Active Directories Are Popular Targets

Authored by: Julio Sanchez In today’s world, with the perpetual threat of breaches always looming, what’s the best way to ensure your organization stays safe? Oftentimes, the best security measure against cyber-attacks is to think like an attacker. When viewing things in this light, it’s immediately clear what makes for a prized gem within your infrastructure: Active Directory. Though such an...
Ecourse

Core Impact Training in 20 Minutes

Our training courses are designed to help our customers get the most out of Core Impact’s powerful features and maximize their return on investment. This training series is designed for both new and experienced users and covers the most common topics from customers. Each course is only 20 minutes, designed to help increase confidence in the platform. ...
Blog

How to Select the Right Third-Party Pen Testing Service

As both cybersecurity breaches and compliance mandates increase, third-party pen testing services are no longer seen as optional. These teams specialize in ethical hacking that gives organizations insight into possible security weaknesses and attack vectors in their IT environment. Being in such high demand, more and more testing services are emerging, presenting businesses with a new challenge of...
Video

Reducing Risk With Penetration Testing

Though cybersecurity defenses are increasingly sophisticated, threat actors have also become more creative in order to achieve their end goals. They continue to find new ways to use the technologies most integral to businesses – mobile devices, computers, servers, websites, wifi, and email – as entry points to breach networks for malicious purposes. What more can be done to reduce the risk of...
Blog

What’s the Difference Between IAM, IGA, and PAM?

The identity security landscape has transformed considerably within the last two decades. And for good reason. Mitigating identity-related access risks has become essential as companies face threats every day, from virtually everywhere. The focus on managing the access of people, digital identities, and privileged accounts has increased significantly to address these risks, and has put Identity...
Blog

Guest Post- Alex Naveira, Director, ITGA & CISO on Compliance

Guest Post- Alex Naveira, Director, ITGA & CISO on Compliance To continue this month's conversation on compliance, we have another special guest joining us on the blog today. Alex Naveira is the Director, ITGA & CISO at Miami Children's Hospital and oversees multiple locations. We asked Alex what compliance meant to him and he had a list of different kinds of compliance and said "which one?"...