Resources

Video

Core Impact Demo with Security Weekly

Paul Asadoorian and Matt Alderman of Security Weekly join Core Security cybersecurity experts for a live demonstration of Core Impact.
Video

Cybersecurity Trends in 2019 and Predictions for 2020

It’s been another whirlwind year in cybersecurity, and it’s important to reflect and learn from everything that’s taken place in 2019. Organizations spent the year facing familiar challenges like ransomware, cryptojacking, and phishing, but seeing the fallout from these breaches also helped the business world prioritize improved vigilance around both external and internal access to sensitive data....
Video

Top Penetration Testing Challenges and How to Overcome Them

A penetration test can be an invaluable tool to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. Despite the necessity for these critical evaluations, many security teams struggle to maximize the effectiveness of pen tests in their organization. In this webinar, cybersecurity experts discuss the challenges of penetration testing, including talent, tools,...
Video

Top Cybersecurity Threats and How SIEM Protects Against Them

Everyone has become increasingly aware of the danger hackers pose—they can steal data, dismantle systems, and cause damage that can take years to recover from. However, organizations often have a false sense of safety when it comes to their security environments. There are countless ways that businesses are making it easier for a threat actor to find their way in undetected. Bob Erdman, senior...
Video

Balancing Security Priorities with User Efficiency

Organizations face a unique balancing act when it comes to user access. On the one hand, they require access to organizational systems and data to successfully do their jobs. On the other, these privileges can cause serious damage if misused—accidentally or intentionally. The question becomes, "do we maintain security at the cost of productivity, or do we increase productivity at the cost of...
Video

How to Mitigate Cyber Risk with Security Information and Event Management (SIEM)

Threats are becoming increasinly more sophisticated, increasing the need to identify and respond to cybersecurity risks in a timely manner. The Cybersecurity Insiders 2020 SIEM Report reveals that 75% agree that Security Information and Event Management (SIEM) is becoming increasingly important to bolstering their security posture. In this webinar, cybersecurity experts discuss how to mitigate...
Video

Incorporating Risk Management into Your Cyber Governance Strategy

With disrupting and devastating attacks occurring every day, it is more important than ever to develop a continuous cybersecurity strategy. Security teams must take the entire cybersecurity environment into account, factoring in everything from new risks, emerging technologies, recruiting talent, and other challenges. How is it possible to implement a successful security strategy suited to an ever...
Video

How to Use Pen Testing Results to Shape Your Broader Security Strategy

Penetration tests have long been known as a critical security tool that exposes security weaknesses through simulated attacks on your IT environment. However, all too often these test results are looked at in a vacuum, without much consideration of how they could be used as a window into the wider security picture. The results of a pen testing campaign should become part of a general retrospective...
Video

Identity Access Management Strategies to Mitigate Risk

Identity and Access Management solutions are a key weapon in the cybersecurity defense arsenal, as they tackle a problem that every organization faces: how do you allow enough access to the business so that valuable work gets done while still enforcing appropriate restrictions to prevent security incidents? In this mid-year report from Cybersecurity Insiders, sponsored by Core Security, a Fortra...
Video

Lazy Pen-Tester Tips and Tricks

In this webinar, we’ll show you how you can leverage Core Impact’s scripting capabilities to build custom setup workflows to make your engagements go more smoothly and efficiently.
Video

PAM Without Passwords: Fast Tracking 2020 Compliance Regimes Without Add-Ons

Since 2000, most Privileged Access Management (PAM) solutions have led with “password first” approaches, primarily with the implementation of centralized Password Vaults. These days, new compliance requirements are driving us towards a password free future that will rely more heavily on solutions like Multi-factor Authentication (MFA). This webinar explores the changes in the way systems are...
Article

Linux Flash for Newbies - The Next Generation: UBI and UBIFS

The latest and greatest in Linux-MTD is UBI and UBIfs. It is important to keep in mind that UBI is not the same as UBIfs. These two are actually two layers in a stack. UBI UBI (unsorted block images) is an abstraction layer that rides
Article

Reversing & Exploiting with Free Tools: Part 1

Pen testing is a dynamic process that requires practitioners to exploit an environment to expose security weaknesses. In order to do this safely and efficiently, pen testers enlist the help of different tools. This article series will focus on reversing and exploiting Windows using free and easy to get tools, such as IDA FREE, Radare, Windbg, X64dbg, or Ghidra.
Article

Reversing & Exploiting with Free Tools: Part 4

In part three, we learned how to analyze the first two exercises (stacks), using the three interactive disassemblers, IDA FREE, RADARE, and GHIDRA. In this next part, we will continue our analysis with stack three and stack four. However, before that we need to introduce the new concept of invalid or bad chars.
Article

Reversing & Exploiting with Free Tools: Part 2

In part one of this series, we focused on installing several tools that will be useful for reversing and exploiting security weaknesses on Windows. These tools are free to access, so anyone can use them to learn and try out the useful exercises
Case Study

WellSpan Health

Overview WellSpan selected Core Security’s Identity Governance & Administration Solution to ensure that access to information, buildings and systems were given to the right people at the right time. Key Results Include: Increased operational efficiency and transparency Strengthened security Improved compliance Delivering fast time to value and the lowest total cost of ownership ...
Case Study

West Midlands Police

Overview West Midlands Police selected the Core Access Assurance Suite to ensure that access to information, buildings, and systems were given to the right people at the right time. Key Results: Increased operational efficiency and transparency Strengthened security Improved compliance Delivering fast time to value and the lowest total cost of ownership ...