News Article
IT Brew: More Than Half of IT Professionals Aren’t Familiar With the Shared Responsibility Model
By Nick Franklin on Fri, 09/20/2024
A recent IT Brew article highlights a major cloud security gap: only 49% of surveyed IT and cybersecurity professionals are familiar with the "shared responsibility model," which defines the division of security duties between cloud providers and customers. Nick Franklin emphasized the common misunderstanding around these responsibilities, urging customers to ask their providers directly about what they are responsible for.
News Article
Reworked: How Security Service Edge Applications Enable Hybrid and Remote Work
By Wade Barisoff on Fri, 09/20/2024
Security Service Edge (SSE) applications are becoming essential for securing hybrid and remote work environments. In a recent article in Reworked, Wade Barisoff highlights which organizations are best suited for SSEs and how these solutions can enhance security effectively.
News Article
DZone: How Developers and Security Professionals Can Collaborate for Better Cybersecurity
By Antonio Sanchez on Fri, 09/13/2024
Improving collaboration between developers and security teams is key to enhancing cybersecurity efforts. At Black Hat 2024, industry experts, including Antonio Sanchez, shared insights with DZone on how these groups can work together more effectively to build secure systems.
Blog
Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)
By Ricardo Narvaja on Mon, 09/09/2024
In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
Blog
Is Your Data REALLY Safe on the IBM i (AS/400)?
By Tom Huntington on Thu, 08/29/2024
Discover the three things you can do, starting today, to ensure your data is properly secured on your IBM i (AS/400).
News Article
The SupplyChainBrain Podcast: The Latest Plague: A Huge Increase in Supply Chain Cyberattacks
By Theo Zafirakos on Wed, 08/07/2024
Theo Zafirakos recently spoke with The SupplyChainBrain Podcast to address third-party risk management, detail incident response plans and answer the question everyone is asking: Is artificial intelligence the answer to, or bane of, supply chain cybersecurity?
News Article
Manufacturing Business Technology: Security Breach Podcast
By Theo Zafirakos on Wed, 07/31/2024
Supply chain attacks disrupt not only the targeted company but also the entire logistical and distribution network, posing significant challenges and costs. Theo Zafirakos addresses how companies should respond to the rise in these attacks on Manufacturing Business Technology's Security Breach Podcast.
Guide
Guide to Creating a Proactive Cybersecurity Strategy
Cyber attacks are common, with 89% of companies experiencing an attack in the last 12 months*. It’s time to stop asking if attacks will occur and start asking if you can stop attacks from being successful. One of the best ways to answer this question is by employing a proactive security program. Using assessment and testing to harden your cybersecurity measures, proactive security: Uncovers...
News Article
Krebs on Security: Microsoft Patch Tuesday, July 2024 Edition
By Tyler Reguly on Thu, 07/18/2024
Tyler Reguly spoke with Brian Krebs about the vulnerabilities Microsoft revealed in its security update for July.
News Article
Dark Reading: Attackers Already Exploiting Flaws in Microsoft's July Security Update
By Tyler Reguly on Thu, 07/18/2024
Microsoft issued 139 unique CVEs in its July Patch Tuesday update. Tyler Reguly spoke with Dark Reading and discussed the CVEs that affect Microsoft SQL Server.
Live Event
Sep
24
All day
Quote
Get Custom Penetration Testing Services Pricing
Find Your VulnerabilitiesCore Security's Security Consulting Services (SCS) simulates trending and new cyber threats to uncover security weaknesses, comply with regulatory compliance standards, and strengthen your security landscape. See how affordable pen testing can be, complete the form and get a customized quote from our experts based on your security needs.Get More With Security Consulting...
News Article
AIthority: Role of AI in Cybersecurity
By John Grancarich on Fri, 06/28/2024
How can companies utilize AI in cybersecurity? John Grancarich, Chief Strategy Officer at Fortra, spoke with AIthority about the role of AI in security operations.
News Article
The ChannelPro Network: Voice of the Vendor
Fri, 06/28/2024
In her interview with The ChannelPro Network, Michaela Grundman, Associate VP of Product Management at Fortra, introduced the Fortra Platform and discussed how it helps mitigate multi-vector attacks.
News Article
IT Nerd: Exclusive Insights from Fortra’s 2024 Penetration Testing Report
By Chris Reffkin on Fri, 06/28/2024
Fortra CISO Chris Reffkin spoke with IT Nerd and shared valuable insights from Fortra’s 2024 Penetration Testing Report.
Demo
Watch a Demo of Fortra Vulnerability Management
Fortra Vulnerability Management (formerly Frontline VM) is more than a scan. This risk-based, scalable VM solution streamlines vulnerability identification and prioritization, producing accurate, actionable reports that empower quick remediation. Whether your team is just beginning network security assessments or establishing on-going, automated assessments and reporting, our feature-rich VM is...
News Article
Tech Newsday: More Snowflake Storage Victims Found, Microsoft Issues New Windows Patches
By Tyler Reguly on Thu, 06/20/2024
In its latest Patch Tuesday update, Microsoft issued a critical bug in Microsoft Message Queuing (MSMQ) technology.