Blog
CISA orders federal agencies to catalog their networks, and scan for bugs
By Graham Cluley on Tue, 10/04/2022
You always want to know what is attached to your network. And whether it could be vulnerable or not.
In any organisation it's normal for different devices, on- or off-prem, wired or wireless, to be constantly added or removed - and this can present an opportunity for malicious hackers to take advantage of improperly secured systems.
In many cases,...
Blog
See Yourself in Cyber: 4 Steps to Stay Safe
By Anastasios Arampatzis on Mon, 10/03/2022
As threats to technology and private information become more frequent, the President of the United States and Congress have proclaimed October to be Cybersecurity Awareness Month. This initiative aims to assist people in protecting themselves online. Government and business are working together to increase cybersecurity awareness on a national and...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022
By Andrew Swoboda on Mon, 10/03/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of September 26th, 2022. I’ve also included some comments on these stories.
Sophos Firewall Zero-Day Exploited in Attacks on...
Blog
UK Construction: Cybersecurity Experts Defend Joint Ventures
By Tripwire Guest Authors on Sun, 10/02/2022
After years of falling behind, the construction industry has realised the importance of its data. Construction-related businesses invested a remarkable 188% more in cybersecurity in 2018–19. Data leaks and cyberattacks have jolted sectors worldwide, affecting everyone. 55% of UK businesses experienced a cyberattack in 2019 alone, and the average...
Blog
Foundational Activities for Secure Software Development
By Tripwire Guest Authors on Sun, 10/02/2022
Follies
The Broadway Tower in Worcestershire, England is a famous structure. It's inspiring, beautiful, and at 62 feet high, like other similar buildings, it's a folly. While it looks grand inside and out, it serves no purpose than to be a decoration.
It’s all too easy to buy a set of policies and procedures, change the company name and some other...
Blog
IT admin admits sabotaging ex-employer's network in bid for higher salary
By Graham Cluley on Thu, 09/29/2022
A 40-year-old man could face up to 10 years in prison, after admitting in a US District Court to sabotaging his former employer's computer systems.
Casey K Umetsu, of Honolulu, Hawaii, has pleaded guilty to charges that he deliberately misdirected a financial company's email traffic and prevented customers from reaching its website in a failed...
Blog
Neither Pointless Nor Boring: Pop It and Lock It Down with CIS Controls
By Matthew Jerzewski on Thu, 09/29/2022
I’m delighted to share that I will be speaking for the first time at SecTor this year. The talk will be in Theatre 1 at 1:15pm on October 5th. In the session Neither Pointless Nor Boring: Pop It And Lock It Down With CIS Controls, I will be discussing the latest version of CIS Controls. There are 18 Controls in Version 8. We will review these before...
Blog
How Can Cybersecurity Professionals Account for Vulnerabilities in Fleet Data?
By Tripwire Guest Authors on Wed, 09/28/2022
Fleet operations today revolve around data. Telematics systems, connected cars, and similar IoT systems provide fleet managers with a wealth of information, but this connectivity also raises security concerns.
As data breach costs reach their highest point in decades, accounting for vulnerabilities in organizations’ data becomes increasingly...
Blog
The UK Smart Grid: How It Started & How It’s Going
By Tripwire Guest Authors on Wed, 09/28/2022
It’s no secret that if nations want to meet the Net Zero emission targets set by international organizations by 2050, there’s a lot of work to be done. In the UK, one of the key initiatives aimed at reducing emissions and increasing energy efficiency is the development of the Smart Grid.
What Is the Smart Grid?
In 2014, the Department of Energy...
Guide
Beyond the Basics: Tripwire Enterprise Use Cases
Security, compliance, and IT operations leaders need a powerful and effective way to accurately identify security misconfigurations and indicators of compromise. Explore the many ways Tripwire Enterprise can protect your organization with superior security and
continuous compliance.
Guide
Zero Trust and the Seven Tenets
Whether you are new to information security, or you’re a long-time practitioner, it seems that “zero trust” is the latest initiative at the top of everyone’s priority list. Special Publication 800-207, created by the National Institute of Standards and Technology (NIST) offers guidance for instituting a zero trust architecture.
The document outlines the basic tenets that form the foundation of...