TechRepublic: Will the White House’s Cybersecurity Policies Protect Business?

Will the White House's Cybersecurity Policies Protect Business?

Dan Patterson of TechRepublic talks to Core Threat Research Manager, Willis McDonald, about the VEP; what it means, the implications, and if the policies will protect businesses.

eBook: A Simple Guide to Successful Penetration Testing

A Simple Guide to Successful Pen-Testing

A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies.

Penetration testing offers many benefits, allowing you to:

TechRepublic: What are zero day exploits?

Zero day exploits: What they are and how they work

Core Security's Bobby Kuzma provided this quick explainer on zero day exploits and why businesses should be concerned about them.

 

Fireside Chat: Stephen Newman and Joseph Blankenship

 

Stephen Newman, SVP of Products at SecureAuth + Core Security, had the opportunity to sit down with Joseph Blankenship, Senior Analyst from Forrester, and discuss various security topics.

In this fireside chat, you will hear their take on:

TechCo’s 2018 Predictions for the Future of Tech

TechCo’s 2018 Predictions for the Future of Tech

Tech innovations tend to be tied to visions of the future, from the Apple’s “sleek and white” house style, evocative of a spaceship, to the sci-fi origins of words like “virus” or “cyberspace.” And by looking to the near future, we can better understand how to prepare for the present.

Understanding the real capabilities of unsupervised machine learning

Understanding the real capabilities of unsupervised machine learning

“Hey, Siri. What is the capital of New York?” We all know what happens next — Siri provides the answer. How Siri knows the correct answer is not a mystery (we have the internet to thank for that), but what is more interesting is the fact that Siri is able to understand the question at all.

The Rising Dangers of Unsecured IoT Technology

The Rising Dangers of Unsecured IoT Technology

As government regulation looms, the security industry must take a leading role in determining whether the convenience of the Internet of Things is worth the risk and compromise of unsecured devices.

Machine Learning: A Primer

Author: 
David Ross, VP Research - SecureAuth

 

Hey, Siri. What is the capital of New York?” We all know what happens next — Siri provides the answer. How Siri knows the correct answer is not a mystery (we have the Internet to thank for that), but what is more interesting is the fact that Siri is able to understand the question at all.

Siri can understand and respond to human speech for the same reason Facebook knows which friend to tag in a photo before you even type their name. This “knowledge” is a technology called machine learning.

Uber Breach Highlights How We Aren’t Learning Our Lesson

Author: 
Ryan Rowcliffe

As an individual working for an identity-based security company, it’s getting a little tiring to hear about yet another preventable breach. At what point will we, as an industry, accept responsibility for protecting user credentials? We see breaches regularly reported and the credential is the common thread. It’s frustrating to know that intelligent authentication solutions could have prevented most of the breaches we read about in the news.

NIST, MFA and the Hokey Pokey

Author: 
Mike Talon | @miketalonync

 

Pages