Resources

Blog

How To Manage the Pen Testing Skills Shortage

According to the 2023 Pen Testing Report, 94% of cybersecurity professionals surveyed felt that penetration testing was somewhat important or important to their organization’s security posture, with 93% also reporting that penetration testing was at least somewhat important to their compliance initiatives. Despite this importance, 55% of cybersecurity professionals reported their organization hasn...
Video

Getting Inside the Mind of an Attacker: TLS Attacks and Pitfalls

Transport Layer Security (TLS) is a common cybersecurity protocol that is frequently seen in email, web browsers, messaging, and other communication methods that take place over networks. TLS is relied upon to ensure secrecy using different techniques like encryption, hash functions, and digital signatures. These days, however, nothing is immune to attack, so despite being designed to improve...
Video

Healthcare Identity Governance 101: Six Proven Strategies for Tackling the Biggest Healthcare Information Security Challenges

Healthcare organizations today face extraordinary challenges in a complex landscape. With increasing regulations, the acceleration of technology, and the demand to do more with less, health systems must address these issues head on, while staying focused on delivering quality patient care. Data breaches in healthcare cost more than $6.45 million on average—higher than any other industry. So the...
Video

2020 Core Security Pen Testing Survey Results

Penetration testing has become one of the best ways to test an organization’s resilience against malicious attackers—using their own tactics to help build a better security posture. Now that pen testing is increasingly standardized and typically a core element of security risk management program, how is it utilized by organizations of different size and industry? A global survey was recently...
Video

Intelligently Mitigate Your Biggest Healthcare Identity Risks

Take the next step in addressing your healthcare organization’s most pressing access-related risks. Watch this on-demand video to learn how you can reveal hidden access risks in your health system to arm yourself with actionable insights. By increasing your access risk intelligence, you can: Discover inappropriate access risks prior to internal audits. Diagnose access risks instantly, and gain...
Video

Modern Day Cyber Threats and How SIEM Solutions Can Reduce Your Risk

Security Information and Event Management solutions have been on the market for well over a decade, and are now commonly known as powerful tools that can provide swift analysis and prioritization that allow security teams to focus and react quickly to the most aggressive threats. But what role does SIEM play in today’s threat landscape? How are features like multi-tenancy, threat intelligence, or...
Video

Core Impact Demo with Security Weekly

Paul Asadoorian and Matt Alderman of Security Weekly join Core Security cybersecurity experts for a live demonstration of Core Impact.
Video

Cybersecurity Trends in 2019 and Predictions for 2020

It’s been another whirlwind year in cybersecurity, and it’s important to reflect and learn from everything that’s taken place in 2019. Organizations spent the year facing familiar challenges like ransomware, cryptojacking, and phishing, but seeing the fallout from these breaches also helped the business world prioritize improved vigilance around both external and internal access to sensitive data....
Video

Top Penetration Testing Challenges and How to Overcome Them

A penetration test can be an invaluable tool to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. Despite the necessity for these critical evaluations, many security teams struggle to maximize the effectiveness of pen tests in their organization. In this webinar, cybersecurity experts discuss the challenges of penetration testing, including talent, tools,...
Video

Top Cybersecurity Threats and How SIEM Protects Against Them

Everyone has become increasingly aware of the danger hackers pose—they can steal data, dismantle systems, and cause damage that can take years to recover from. However, organizations often have a false sense of safety when it comes to their security environments. There are countless ways that businesses are making it easier for a threat actor to find their way in undetected. Bob Erdman, senior...
Video

Balancing Security Priorities with User Efficiency

Organizations face a unique balancing act when it comes to user access. On the one hand, they require access to organizational systems and data to successfully do their jobs. On the other, these privileges can cause serious damage if misused—accidentally or intentionally. The question becomes, "do we maintain security at the cost of productivity, or do we increase productivity at the cost of...
Video

How to Mitigate Cyber Risk with Security Information and Event Management (SIEM)

Threats are becoming increasinly more sophisticated, increasing the need to identify and respond to cybersecurity risks in a timely manner. The Cybersecurity Insiders 2020 SIEM Report reveals that 75% agree that Security Information and Event Management (SIEM) is becoming increasingly important to bolstering their security posture. In this webinar, cybersecurity experts discuss how to mitigate...
Video

Incorporating Risk Management into Your Cyber Governance Strategy

With disrupting and devastating attacks occurring every day, it is more important than ever to develop a continuous cybersecurity strategy. Security teams must take the entire cybersecurity environment into account, factoring in everything from new risks, emerging technologies, recruiting talent, and other challenges. How is it possible to implement a successful security strategy suited to an ever...
Video

How to Use Pen Testing Results to Shape Your Broader Security Strategy

Penetration tests have long been known as a critical security tool that exposes security weaknesses through simulated attacks on your IT environment. However, all too often these test results are looked at in a vacuum, without much consideration of how they could be used as a window into the wider security picture. The results of a pen testing campaign should become part of a general retrospective...