Blue Core Research
Contact Us

Author: Eyal Kalderon

  • Webinar: Successful Data Masking – problems and solutions

    Webinar: Successful Data Masking – problems and solutions

    Webinar: How to succeed in data masking Are you worried about successfully deploying a data masking solution? If you’re thinking about starting a data masking project or tried to mask and failed, we can help. Let us show you what to look for and how to overcome these obstacles. Join our free webinar and discover…

  • Data Masking Performance

    Data Masking Performance

    Significance Data masking is not a daily task, so why is performance a vital subject to consider? While it’s of minor significance whether a data masking process takes 5 seconds or 5 minutes, it’s critical if it takes five days or will never finish. Impossibly long run times are not unusual and render the product…

  • Story of a Cyberattack

    Story of a Cyberattack

    The Attack Begins The blip of a new email flashed on Cora’s screen. It was yet another alert from Core Audit, and it wasn’t the first one of the day. But a quick glance at the SQLs and adrenaline jolted her awake. It felt like caffeine was pumping directly into her brain. That is not…

  • Risk Control Matrix

    Risk Control Matrix

    We previously discussed data-centric security and the need for airtight defenses. Using IDS and IPS is a first step in that direction, but let’s take things further by creating overlapping controls that will tighten security much more. The risk-control matrix is at the core of security planning. The matrix maps our risks to the controls…

  • IDS & IPS

    IDS & IPS

    We previously discussed data-centric defenses as the critical last line of defense. As such, one of our requirements is to try and make it as airtight as possible. That’s not a minor or trivial requirement. In this article, we’ll discuss how we can get there. There are two concepts we’ll need to discuss: False negatives…

  • Data-Centric Security

    Data-Centric Security

    We often think of cybersecurity as made up of silos. There’s network security, training, physical security, email security, etc. Each silo usually includes multiple solutions. For example, network security includes firewalls, routers, VLANs, and similar measures that are not necessarily directly related. The problem with any issue comprised of many unrelated components is that it’s…

  • 2024 Webinar May 16

    2024 Webinar May 16

    Free webinar: Protect your applications Application security is challenging, with many attack vectors to consider, so how can we combat all these threats? Join our webinar and listen to our experts discussing mitigation strategies for various attacks across multiple application tiers. Topics: Speakers Ana Houlston DBlandIT Christian Carlos TS4B Felipe A. Jaramillo BT Consulting Carlos Miquelarena…

  • Q&A’s: Data Masking

    Q&A’s: Data Masking

    1. Why mask? Because we can’t protect the data outside of production: Imagine copying customer data for testing. How could you protect it after copying it? Without data masking, you will expose all names, addresses, phone numbers, emails, financial information, and more. Static masking replaces these values with good fakes so you can test without jeopardizing…

  • Database Visibility: Poll Results

    Database Visibility: Poll Results

    Recent polls of cybersecurity professionals show most respondents (82%) have partial or no visibility into their databases and need it. Few said they have good visibility (7%) or don’t need it (11%). The surveys were conducted in various LinkedIn groups in English and Spanish, asking: “Do you have visibility into what’s happening within your database?”.…

  • Anomaly Analysis

    Anomaly Analysis

    Anomaly analysis uses behavioral analysis, helping you save time while expanding your control to vast activity volumes. These capabilities are made possible by the unique security repository technology in Core Audit. The anomaly analysis engine dynamically creates behavioral profiles based on the activity captured by the security repository, allowing you to compare the present with…