Resources

Video

Intelligently Mitigate Your Biggest Healthcare Identity Risks

Take the next step in addressing your healthcare organization’s most pressing access-related risks. Watch this on-demand video to learn how you can reveal hidden access risks in your health system to arm yourself with actionable insights. By increasing your access risk intelligence, you can: Discover inappropriate access risks prior to internal audits. Diagnose access risks instantly, and gain...
Video

Modern Day Cyber Threats and How SIEM Solutions Can Reduce Your Risk

Security Information and Event Management solutions have been on the market for well over a decade, and are now commonly known as powerful tools that can provide swift analysis and prioritization that allow security teams to focus and react quickly to the most aggressive threats. But what role does SIEM play in today’s threat landscape? How are features like multi-tenancy, threat intelligence, or...
Video

Core Impact Demo with Security Weekly

Paul Asadoorian and Matt Alderman of Security Weekly join Core Security cybersecurity experts for a live demonstration of Core Impact.
Video

Cybersecurity Trends in 2019 and Predictions for 2020

It’s been another whirlwind year in cybersecurity, and it’s important to reflect and learn from everything that’s taken place in 2019. Organizations spent the year facing familiar challenges like ransomware, cryptojacking, and phishing, but seeing the fallout from these breaches also helped the business world prioritize improved vigilance around both external and internal access to sensitive data....
Video

Top Penetration Testing Challenges and How to Overcome Them

A penetration test can be an invaluable tool to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. Despite the necessity for these critical evaluations, many security teams struggle to maximize the effectiveness of pen tests in their organization. In this webinar, cybersecurity experts discuss the challenges of penetration testing, including talent, tools,...
Video

Top Cybersecurity Threats and How SIEM Protects Against Them

Everyone has become increasingly aware of the danger hackers pose—they can steal data, dismantle systems, and cause damage that can take years to recover from. However, organizations often have a false sense of safety when it comes to their security environments. There are countless ways that businesses are making it easier for a threat actor to find their way in undetected. Bob Erdman, senior...
Video

Balancing Security Priorities with User Efficiency

Organizations face a unique balancing act when it comes to user access. On the one hand, they require access to organizational systems and data to successfully do their jobs. On the other, these privileges can cause serious damage if misused—accidentally or intentionally. The question becomes, "do we maintain security at the cost of productivity, or do we increase productivity at the cost of...
Video

How to Mitigate Cyber Risk with Security Information and Event Management (SIEM)

Threats are becoming increasinly more sophisticated, increasing the need to identify and respond to cybersecurity risks in a timely manner. The Cybersecurity Insiders 2020 SIEM Report reveals that 75% agree that Security Information and Event Management (SIEM) is becoming increasingly important to bolstering their security posture. In this webinar, cybersecurity experts discuss how to mitigate...
Video

Incorporating Risk Management into Your Cyber Governance Strategy

With disrupting and devastating attacks occurring every day, it is more important than ever to develop a continuous cybersecurity strategy. Security teams must take the entire cybersecurity environment into account, factoring in everything from new risks, emerging technologies, recruiting talent, and other challenges. How is it possible to implement a successful security strategy suited to an ever...
Video

How to Use Pen Testing Results to Shape Your Broader Security Strategy

Penetration tests have long been known as a critical security tool that exposes security weaknesses through simulated attacks on your IT environment. However, all too often these test results are looked at in a vacuum, without much consideration of how they could be used as a window into the wider security picture. The results of a pen testing campaign should become part of a general retrospective...
Video

Identity Access Management Strategies to Mitigate Risk

Identity and Access Management solutions are a key weapon in the cybersecurity defense arsenal, as they tackle a problem that every organization faces: how do you allow enough access to the business so that valuable work gets done while still enforcing appropriate restrictions to prevent security incidents? In this mid-year report from Cybersecurity Insiders, sponsored by Core Security, a Fortra...
Video

Lazy Pen-Tester Tips and Tricks

In this webinar, we’ll show you how you can leverage Core Impact’s scripting capabilities to build custom setup workflows to make your engagements go more smoothly and efficiently.
Video

PAM Without Passwords: Fast Tracking 2020 Compliance Regimes Without Add-Ons

Since 2000, most Privileged Access Management (PAM) solutions have led with “password first” approaches, primarily with the implementation of centralized Password Vaults. These days, new compliance requirements are driving us towards a password free future that will rely more heavily on solutions like Multi-factor Authentication (MFA). This webinar explores the changes in the way systems are...
Article

Linux Flash for Newbies - The Next Generation: UBI and UBIFS

The latest and greatest in Linux-MTD is UBI and UBIfs. It is important to keep in mind that UBI is not the same as UBIfs. These two are actually two layers in a stack. UBI UBI (unsorted block images) is an abstraction layer that rides
Article

Reversing & Exploiting with Free Tools: Part 1

Pen testing is a dynamic process that requires practitioners to exploit an environment to expose security weaknesses. In order to do this safely and efficiently, pen testers enlist the help of different tools. This article series will focus on reversing and exploiting Windows using free and easy to get tools, such as IDA FREE, Radare, Windbg, X64dbg, or Ghidra.
Article

Reversing & Exploiting with Free Tools: Part 4

In part three, we learned how to analyze the first two exercises (stacks), using the three interactive disassemblers, IDA FREE, RADARE, and GHIDRA. In this next part, we will continue our analysis with stack three and stack four. However, before that we need to introduce the new concept of invalid or bad chars.
Article

Reversing & Exploiting with Free Tools: Part 2

In part one of this series, we focused on installing several tools that will be useful for reversing and exploiting security weaknesses on Windows. These tools are free to access, so anyone can use them to learn and try out the useful exercises