Resources

Video

Identity Access Management Strategies to Mitigate Risk

Identity and Access Management solutions are a key weapon in the cybersecurity defense arsenal, as they tackle a problem that every organization faces: how do you allow enough access to the business so that valuable work gets done while still enforcing appropriate restrictions to prevent security incidents? In this mid-year report from Cybersecurity Insiders, sponsored by Core Security, a Fortra...
Video

Lazy Pen-Tester Tips and Tricks

In this webinar, we’ll show you how you can leverage Core Impact’s scripting capabilities to build custom setup workflows to make your engagements go more smoothly and efficiently.
Video

PAM Without Passwords: Fast Tracking 2020 Compliance Regimes Without Add-Ons

Since 2000, most Privileged Access Management (PAM) solutions have led with “password first” approaches, primarily with the implementation of centralized Password Vaults. These days, new compliance requirements are driving us towards a password free future that will rely more heavily on solutions like Multi-factor Authentication (MFA). This webinar explores the changes in the way systems are...
Article

Linux Flash for Newbies - The Next Generation: UBI and UBIFS

The latest and greatest in Linux-MTD is UBI and UBIfs. It is important to keep in mind that UBI is not the same as UBIfs. These two are actually two layers in a stack. UBI UBI (unsorted block images) is an abstraction layer that rides
Article

Reversing & Exploiting with Free Tools: Part 1

Pen testing is a dynamic process that requires practitioners to exploit an environment to expose security weaknesses. In order to do this safely and efficiently, pen testers enlist the help of different tools. This article series will focus on reversing and exploiting Windows using free and easy to get tools, such as IDA FREE, Radare, Windbg, X64dbg, or Ghidra.
Article

Reversing & Exploiting with Free Tools: Part 4

In part three, we learned how to analyze the first two exercises (stacks), using the three interactive disassemblers, IDA FREE, RADARE, and GHIDRA. In this next part, we will continue our analysis with stack three and stack four. However, before that we need to introduce the new concept of invalid or bad chars.
Article

Reversing & Exploiting with Free Tools: Part 2

In part one of this series, we focused on installing several tools that will be useful for reversing and exploiting security weaknesses on Windows. These tools are free to access, so anyone can use them to learn and try out the useful exercises
Case Study

WellSpan Health

Overview WellSpan selected Core Security’s Identity Governance & Administration Solution to ensure that access to information, buildings and systems were given to the right people at the right time. Key Results Include: Increased operational efficiency and transparency Strengthened security Improved compliance Delivering fast time to value and the lowest total cost of ownership ...
Case Study

West Midlands Police

Overview West Midlands Police selected the Core Access Assurance Suite to ensure that access to information, buildings, and systems were given to the right people at the right time. Key Results: Increased operational efficiency and transparency Strengthened security Improved compliance Delivering fast time to value and the lowest total cost of ownership ...
Case Study

Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security

Overview A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500 licensed beds...
Case Study

U.S. Government Laboratory

Overview Core Impact helped this U.S. Government Lab: Compliment vulnerability scanning Prepare for security audits Test end-user security awareness
Case Study

Large Midwestern University

Overview Core Impact helped this large Midwestern University: Improve security holistically Find client side vulnerabilities Test web applications Ease PCI compliance
Case Study

Global Manufacturer Case Study

Overview With the help of Core Security Password Management, the IT staff at this global manufacturing customer has achieved its goals of reducing the costs of managing access and authentication for its large community of end users, improving productivity through self-service and user support responsiveness, enhancing overall password security and adhering to audit compliance requirements. Key...