Stopping to Smell the Updates: CORE IMPACT Pro Exceeds 100 Updates YTD
Here we are in the middle of March, and it is hard to believe we are almost a quarter of a way through 2011. What is even more impressive is the rate at which the Exploit Writing Team, the CORE IMPACT...
View ArticleMobile Risk Management in the Age of 4G
When Guglielmo Marconi first demonstrated wireless telegraphy in 1896, he probably did not foresee an era when the telephone would be wireless and subsequently utilized to facilitate global commerce....
View ArticleWhy Limit Yourself When Penetration Testing?
Having worked with such a large number of our customers in both technical support and training has really shed some light on the truths of commercial penetration testing. The reality we face is that...
View ArticlePick an Access Point, any Access Point: Assessing Man-in-the-Middle Threats...
One of the things that I love about working for Core is our freedom to work on things that we are interested in. Instead of being expected to focus 100% on the project du jour and produce x lines of...
View ArticleTest the Weakest Link and Phish Your Users
I’ve been advocating for the use of email born phishing tests against the user population within companies for over six years now, and I have to admit the fight is a complex one. Most of the network...
View Article