Portland, OR, USA
Jul 6, 2020   |  By Tripwire Guest Authors
If the global cybercrime forecast took the form of a weather report, it might go something like this: The extended outlook calls for continued online lawlessness, scattered malware attacks and an ongoing blizzard of data breaches. After all, with experts predicting that the cybercrime epidemic will cost the world $6 trillion annually by 2021 as the shortage of qualified cybersecurity professionals climbs to 3.5 million unfilled positions, the metaphor of dark skies is hardly an exaggeration.
Jul 6, 2020   |  By Anirudh Chand
In 2020, car manufacturer Honda fell victim to a ransomware attack. Using a payload called “update.exe,” the attack crippled Honda’s international customer service and Financial Services wing for days. Although it affected two customer facing branches of this global corporation, the ransomware was designed to target and breach Honda’s critical ICS/SCADA environments.
Jul 5, 2020   |  By Robert Landavazo
The cyber threat landscape today continues to pose a myriad of unique challenges. This is especially the case for industrial organizations due to factors such as aging equipment, poor design or implementation, skills gaps and a lack of visibility. These shortcomings are exacerbated by the mean time to breach detection, which continues to hover above 150 days on average.
Jul 2, 2020   |  By Graham Cluley
Hackers are once again finding unsecured MongoDB databases carelessly left exposed on the internet, wiping their contents, and leaving a ransom note demanding a cryptocurrency payment for the data’s safe return. As ZDNet reports, ransom notes have been left on almost 23,000 MongoDB databases that were let unprotected on the public internet without a password. Unsecured MongoDB databases being attacked by hackers is nothing new, of course.
Jul 1, 2020   |  By Chris Orr
What are the brakes on a car designed to do? I have asked this question many times when speaking to customers or organizations who were dipping their toes into the audit space. Invariably, their answer was, “To stop the car.” At this point, I would then ask, “Then how do you get where you want to go?”
Jun 4, 2019   |  By Tripwire
Learn how to use security File Integrity Monitoring effectively and strategically in your organization.
Jan 24, 2019   |  By Tripwire
Achieving DevOps security is as much a cultural effort as it is a technical one, and quality gates present the perfect opportunity to bridge the gap. Because they function within the bounds of regular DevOps processes, tools that bake security into the CI/CD pipeline by way of quality gates are more likely to win DevOps teams over.
Oct 26, 2018   |  By Tripwire
Learn how Log Management can complement SIEM, Security Analytics and Big Data tools within your organization.
Oct 26, 2018   |  By Tripwire
Establish and sustain the Four Essential Pillars of Federal Cybersecurity
Oct 1, 2018   |  By Tripwire
How to introduce security without losing the benefits of containers.
Jun 30, 2020   |  By Tripwire
This webinar explores new and emerging risks facing civil service security professionals, system managers and business owners, and provides ways to combat them.Paul Edon, Senior Director for Technical Sales and Services (EMEA) at global cybersecurity provider Tripwire, covers topics including.
Jun 18, 2020   |  By Tripwire
In this video, industry professionals share their perspectives on the key considerations to build an effective, and robust, vulnerability management (VM) program.
Jun 17, 2020   |  By Tripwire
Cybersecurity is part of the pandemic response, plain and simple. To learn more about how security professionals are dealing with this crisis, Tripwire conducted a survey in partnership with Dimensional Research.
Jun 15, 2020   |  By Tripwire
Paul "PJ" Norris, Sr. Systems Engineer at Tripwire, shares some of the key findings from Tripwire's research on COVID-19's impact on remote work and cybersecurity.
Jun 10, 2020   |  By Tripwire
What can the cybersecurity industry learn from DevOps practices and cloud adoption? We asked various information security professionals to share their thoughts on how agile processes and flexibility could benefit security.