Passion and Relevance is Our Core
Nearly every IT security company sees its ultimate goal as making the electronic world a safer place to live and do business. At Core, we embrace this pursuit in a truly unique and powerful manner.
View ArticleIntelligent Planning for Vulnerability Management
Vulnerability management can be a complex process to embrace. That's why organizations attempting to get further involved in the work should always have a comprehensive game plan.
View ArticleGood News for Ethical Hacking
A new survey coming out of BT finds that more companies than ever have embraced penetration testing as the best way to manage risk and prevent future data breaches.
View ArticleMobile Risk Management in the Age of 4G
When Guglielmo Marconi first demonstrated wireless telegraphy in 1896, he probably did not foresee an era when the telephone would be wireless and subsequently utilized to facilitate global commerce....
View ArticleMirror Mirror on the Wall
Cyber crime has exploded in 2011. US-CERT noted a 40% increase in computer intrusions and the FBI’s number-one criminal priority is still cybercrime. The recently released SAIC / MacAfee study,...
View ArticleEnough Already!
Could it be any clearer that information security approaches that focus on defensive tactics just aren’t working? How many times do we need to open the Wall Street Journal and see a headline about how...
View ArticleWith Friends Like This, Who Needs Enemies?
As the manager (and former lead engineer) of the “security intelligence” portions of our Insight product, I’m often tasked with thinking about security in different ways. A big part of that is finding...
View ArticleWhat’s a CISO to do?
News out of Cupertino this week regarding a network breach and the resulting stolen source code representing four major security products is enough to make any CISO go prematurely gray. We understand...
View ArticleCode Theft is Not Really Theft
The government ruling that “code theft” does not constitute as actual criminal theft might not seem at first to be a huge deal. But in reality – at least to software companies that produce their own...
View ArticleEffective Security is about Solving problems, Not Chasing Hype
It had all the makings of sexy security story, a catchy name, international cyber criminals, the FBI, and the potential for thousands to be cut off from the Internet service they depend on. Yet in the...
View ArticleIs Cyber Security About to Become a Big Election Issue?
Those of us in the security industry have been wondering aloud for some time as to when the issue of cyber security would make its way into the election cycle. After the economy, national security is...
View ArticleThe Threats that Justify the Hype
Having been in the security industry for a long time now, I’m keenly aware of the fact that we are sometimes upstaged by expectations that don’t immediately materialize. Consider it an occupational...
View ArticleThe “Tipping Point”
Despite ample press coverage of massive, costly attacks despite all the warnings from experts many corporate leaders fail to fully appreciate the risk of IT security breaches and attacks. Executives...
View ArticleLondon Takes Gold in CyberSecurity
Maybe no news really is good news. I realize a lead that says ‘Nothing Happened’ isn’t going to excite a lot of people, but when the entire world is watching and almost expecting a significant...
View ArticleWhat Shark Week Can Teach Us About Cybersecurity
Shark Week on Discovery Channel is undoubtedly one of the television highlights of the summer. Despite the fact that a large percentage of the population may have an extreme (and justified) fear when...
View ArticleCounting on a U.S. Cybersecurity Bill? You May Want to Rethink Your Strategy
If you have been paying attention to the ongoing debate in Washington regarding the fate of the Cybersecurity Act of 2012, you undoubtedly know by now that the latest efforts to enact a form of cyber...
View ArticleWhat a Cybersecurity Executive Order Should Look Like
There has been a lot of talk about whether President Obama should issue a cyber-security Executive Order since a Congressional filibuster last month killed the idea in bill form. And pressure is...
View ArticleWashington confirms Chinese hack attack on White House computer
There is nothing more scary than the above headline, taken straight from foxnews.com. According to reports a phishing email was sent to a user on the White House computer network, the email was...
View Article
More Pages to Explore .....