Thank You for Downloading Our Penetration Testing eBook

A Simple Guide to Successful Pen-Testing

A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies.

Penetration testing offers many benefits, allowing you to:

Staying Secure at 30,000 Feet - Part Two

Author: 
Mike Talon | @miketalonNYC

 

In the first part of this blog, we reviewed how vulnerable you can be while traveling and on a public Wi-Fi network. So how are some ways you can secure and protect your data and credentials while traveling?  Here are a few ways:

1 – You could not use them.  This is the safest, but not always a practical way.  On a six hour plus flight, I could decide not to use the Wi-Fi. Let’s be real, I will definitely be using the Wi-Fi.  

SAML Vulnerabilities: Canonicalization and DOM traversal

Author: 
Jeff Hickman - Enterprise Architect

 

On February 27th, 2018 Duo Security posted a blog about a vulnerability they found in a number of SAML libraries used by a number of vendors, developers, and enterprises alike.

These findings are tied to a number of Common Vulnerabilities and Exposures (CVE) depending on the library or product affected. The filling can be found here: https://www.kb.cert.org/vuls/id/475445.

TechRepublic: Will the White House’s Cybersecurity Policies Protect Business?

Will the White House's Cybersecurity Policies Protect Business?

Dan Patterson of TechRepublic talks to Core Threat Research Manager, Willis McDonald, about the VEP; what it means, the implications, and if the policies will protect businesses.

eBook: A Simple Guide to Successful Penetration Testing

A Simple Guide to Successful Pen-Testing

A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies.

Penetration testing offers many benefits, allowing you to:

TechRepublic: What are zero day exploits?

Zero day exploits: What they are and how they work

Core Security's Bobby Kuzma provided this quick explainer on zero day exploits and why businesses should be concerned about them.

 

Fireside Chat: Stephen Newman and Joseph Blankenship

 

Stephen Newman, SVP of Products at SecureAuth + Core Security, had the opportunity to sit down with Joseph Blankenship, Senior Analyst from Forrester, and discuss various security topics.

In this fireside chat, you will hear their take on:

TechCo’s 2018 Predictions for the Future of Tech

TechCo’s 2018 Predictions for the Future of Tech

Tech innovations tend to be tied to visions of the future, from the Apple’s “sleek and white” house style, evocative of a spaceship, to the sci-fi origins of words like “virus” or “cyberspace.” And by looking to the near future, we can better understand how to prepare for the present.

Understanding the real capabilities of unsupervised machine learning

Understanding the real capabilities of unsupervised machine learning

“Hey, Siri. What is the capital of New York?” We all know what happens next — Siri provides the answer. How Siri knows the correct answer is not a mystery (we have the internet to thank for that), but what is more interesting is the fact that Siri is able to understand the question at all.

The Rising Dangers of Unsecured IoT Technology

The Rising Dangers of Unsecured IoT Technology

As government regulation looms, the security industry must take a leading role in determining whether the convenience of the Internet of Things is worth the risk and compromise of unsecured devices.

Pages