Blue Core Research
Contact Us

Author: Eyal Kalderon

  • Risk Control Matrix

    Risk Control Matrix

    We previously discussed data-centric security and the need for airtight defenses. Using IDS and IPS is a first step in that direction, but let’s take things further by creating overlapping controls that will tighten security much more. The risk-control matrix is at the core of security planning. The matrix maps our risks to the controls…

  • IDS & IPS

    IDS & IPS

    We previously discussed data-centric defenses as the critical last line of defense. As such, one of our requirements is to try and make it as airtight as possible. That’s not a minor or trivial requirement. In this article, we’ll discuss how we can get there. There are two concepts we’ll need to discuss: False negatives…

  • Data-Centric Security

    Data-Centric Security

    We often think of cybersecurity as made up of silos. There’s network security, training, physical security, email security, etc. Each silo usually includes multiple solutions. For example, network security includes firewalls, routers, VLANs, and similar measures that are not necessarily directly related. The problem with any issue comprised of many unrelated components is that it’s…

  • 2024 Webinar May 16

    2024 Webinar May 16

    Free webinar: Protect your applications Application security is challenging, with many attack vectors to consider, so how can we combat all these threats? Join our webinar and listen to our experts discussing mitigation strategies for various attacks across multiple application tiers. Topics: Speakers Ana Houlston DBlandIT Christian Carlos TS4B Felipe A. Jaramillo BT Consulting Carlos Miquelarena…

  • Q&A’s: Data Masking

    Q&A’s: Data Masking

    1. Why mask? Because we can’t protect the data outside of production: Imagine copying customer data for testing. How could you protect it after copying it? Without data masking, you will expose all names, addresses, phone numbers, emails, financial information, and more. Static masking replaces these values with good fakes so you can test without jeopardizing…

  • Database Visibility: Poll Results

    Database Visibility: Poll Results

    Recent polls of cybersecurity professionals show most respondents (82%) have partial or no visibility into their databases and need it. Few said they have good visibility (7%) or don’t need it (11%). The surveys were conducted in various LinkedIn groups in English and Spanish, asking: “Do you have visibility into what’s happening within your database?”.…

  • Anomaly Analysis

    Anomaly Analysis

    Anomaly analysis uses behavioral analysis, helping you save time while expanding your control to vast activity volumes. These capabilities are made possible by the unique security repository technology in Core Audit. The anomaly analysis engine dynamically creates behavioral profiles based on the activity captured by the security repository, allowing you to compare the present with…

  • Proactive Forensics

    Proactive Forensics

    One of the popular myths about security is that you can get it out of the box. Just install something, and voila! You’re magically secured. But that never works. Regardless of what you’re trying to secure, your first step should always be understanding the activity. You should know how the system is used, by whom,…

  • Fitted Security

    Fitted Security

    Many organizations design their cybersecurity strategy and decide what solutions to purchase based on industry trends and best practices. The outcome is often imbalanced and inappropriate to the organization’s risk profile and security needs. Best-practice implementations are usually one-size-fits-all and not tailored to the specific environment. Being predictable, there are usually tools and guides on…

  • SQL Injection attack detection

    SQL Injection attack detection

    This is a true story of a SQL injection attack on our website. Learn about the attack and why the Core Audit anomaly analysis database defense is the most effective way to combat this type of threat. Introduction We got an alert two days before New Year’s. It was shortly after midnight on December 30,…