Resources

Blog

Thoughts from Black Hat and Defcon

Getting home from what we affectionately call Security Summer Camp is almost as much of an adventure as attending the conferences. Getting caught in the Deltapocalypse on the way home just added to the fun. If you want a real challenge, try seeing your way onto earlier flights during a system-wide meltdown of a major legacy carrier.
Blog

Obligatory Java “zero-day” Blog Post

When my mother emails to ask if she should be worried about the Java vulnerability the saw on the news, you know a security issue has gone mainstream. And it seems you cannot be a security company without having a blog warning of the dangers presented by the Java exploit.
Blog

When to Use a Pen Test Versus Vulnerability Scan

Penetration testing versus vulnerability scanning. It all sounds the same or does the same thing, doesn’t it? Mistakenly, these terms are often used interchangeably even though there are some fundamental differences. Here we will distinguish the two and help you see what value each could bring to your business. What to Expect in a Pen Test A penetration tester has the goal of getting through...
Blog

A New Way of Thinking About Vulnerability Management

How do you look at vulnerability management? We’ve seen several blogs on this topic in the past month and even a webinar with one of our security consultants but the truth is that everyone looks at this issue differently. From scanning and assessments to prioritization and patching, vulnerability management is a lot of different things but it is not and never should be seen as: Just a list of...
Blog

4 Steps to Building a Vulnerability Management Program

Day after day we hear stories of companies being breached because of vulnerabilities in their systems. While some of these vulnerabilities may be new, the majority of breaches are caused by vulnerabilities that have had a patch available for weeks, months, even years but are left unpatched. If you know that there are vulnerabilities on your network, why wouldn’t you patch them immediately? Simply...
Blog

Navigating Your Vulnerability Management Program

OK, I admit it. I use GPS to navigate some routes I’ve driven at least a hundred times. It’s a relief to hear that robotic voice helping me with every single turn on my way home. Here at Core, we asked-how can we make the vulnerability management journey easier for organizations to traverse to reduce the risk of a potential security breach? Ah, yes, a roadmap of sorts to follow to ensure a...
Blog

How To Manage the Pen Testing Skills Shortage

According to the 2023 Pen Testing Report, 94% of cybersecurity professionals surveyed felt that penetration testing was somewhat important or important to their organization’s security posture, with 93% also reporting that penetration testing was at least somewhat important to their compliance initiatives. Despite this importance, 55% of cybersecurity professionals reported their organization hasn...
Video

Getting Inside the Mind of an Attacker: TLS Attacks and Pitfalls

Transport Layer Security (TLS) is a common cybersecurity protocol that is frequently seen in email, web browsers, messaging, and other communication methods that take place over networks. TLS is relied upon to ensure secrecy using different techniques like encryption, hash functions, and digital signatures. These days, however, nothing is immune to attack, so despite being designed to improve...
Video

Healthcare Identity Governance 101: Six Proven Strategies for Tackling the Biggest Healthcare Information Security Challenges

Healthcare organizations today face extraordinary challenges in a complex landscape. With increasing regulations, the acceleration of technology, and the demand to do more with less, health systems must address these issues head on, while staying focused on delivering quality patient care. Data breaches in healthcare cost more than $6.45 million on average—higher than any other industry. So the...
Video

2020 Core Security Pen Testing Survey Results

Penetration testing has become one of the best ways to test an organization’s resilience against malicious attackers—using their own tactics to help build a better security posture. Now that pen testing is increasingly standardized and typically a core element of security risk management program, how is it utilized by organizations of different size and industry? A global survey was recently...
Video

Intelligently Mitigate Your Biggest Healthcare Identity Risks

Take the next step in addressing your healthcare organization’s most pressing access-related risks. Watch this on-demand video to learn how you can reveal hidden access risks in your health system to arm yourself with actionable insights. By increasing your access risk intelligence, you can: Discover inappropriate access risks prior to internal audits. Diagnose access risks instantly, and gain...
Video

Modern Day Cyber Threats and How SIEM Solutions Can Reduce Your Risk

Security Information and Event Management solutions have been on the market for well over a decade, and are now commonly known as powerful tools that can provide swift analysis and prioritization that allow security teams to focus and react quickly to the most aggressive threats. But what role does SIEM play in today’s threat landscape? How are features like multi-tenancy, threat intelligence, or...