Blue Core Research
Contact Us

Author: Guadalupe Boll

  • Budgeting for a Secured Future

    Budgeting for a Secured Future

    Cybersecurity Underinvestment Data breaches are at an all-time high. Different studies show different figures about which countries are most under attack, but it’s pretty obvious that nowhere is safe. It seems as though the whole world is under attack and there are many successful data breaches. At the same time, investment in cybersecurity is insufficient…

  • From a hacker’s perspective

    From a hacker’s perspective

    Attack Detail & Analysis Below we’ll explain the types of attacks used in the comics, provide statistics about their prevalence, and discuss possible defensive measures. This attack and successful breach required a combination of several steps. That’s how all breaches are. While it may not be possible to stop them all the steps, you should…

  • Email Security: Effectiveness & Risks

    Email Security: Effectiveness & Risks

    What Happened? Hackers found an exploit in organizations that use Office 365 and Proofpoint. The exploit allowed the hackers to send authenticated emails with digital signatures identical to emails sent by those organizations. The list of exploited organizations includes Disney, Coca-Cola, IBM, Nike, Best Buy, and many others. Using this exploit, hackers sent over at…

  • Perimeter Vs. Data-Centric Guide

    Perimeter Vs. Data-Centric Guide

    Download Guide RELATED POSTS

  • Potential risks in endpoint security

    Potential risks in endpoint security

    What Happened As we’ve seen, a bug in a CrowdStrike update caused worldwide havoc. Approximately 8 million Windows computers crashed at many companies, from airlines to broadcast news to hospitals. Desperate users took to forums, some entire organizations ground to a halt, and some problems persisted for days and longer. While CrowdStrike was able to…