Portland, OR, USA
Nov 21, 2019   |  By David Bisson
Malicious actors are increasingly launching digital attacks against industrial organizations. Many of these campaigns have been successful, particularly those that have targeted energy utilities and manufacturing plants. In late spring 2019, for instance, aircraft parts manufacturer ASCO temporarily suspended operations worldwide after falling victim to a ransomware attack.
Nov 20, 2019   |  By David Bisson
Organizations are increasingly preoccupied with strengthening the digital security of their industrial control systems (ICS). They no doubt heard FireEye reveal that it had detected a second intrusion by the same actor behind Triton malware at a second critical infrastructure organization. More recently, they likely heard confirmation of a digital attack that struck the Kudankulam Nuclear Power Plant (KKNPP) in Tamil Nadu, India back in September.
Nov 19, 2019   |  By Graham Cluley
Ransomware hit Louisiana’s state government hard yesterday, shutting down multiple websites and email systems after it fell victim for the second time in just a few months to a ransomware attack.
Nov 19, 2019   |  By Tripwire Guest Authors
This is a follow-up/continuation to Part One of the series, where I recommend reading to help provide some background into why we should all consider reviewing our OPSEC (Operational Security), not just those with something to hide. Have you actually thought about how much you are tracked on a daily basis? Think about everything you post on social media, what you search, the apps that are generating metadata (with or without your consent), what your phone knows about you.
Nov 18, 2019   |  By Chris Hudson
As business adoption of cloud services continues to grow at a rapid pace, so does the need to adapt security methods to accommodate the myriad of options. Traditional best practices often still provide a solid foundation from which to build on, but depending upon the technologies you opt to migrate to the cloud, different challenges and solutions need to be explored in order to ensure that your security operations can maintain visibility and control and prevent critical risks and vulnerabilities.
Jun 4, 2019   |  By Tripwire
Learn how to use security File Integrity Monitoring effectively and strategically in your organization.
Jan 24, 2019   |  By Tripwire
Achieving DevOps security is as much a cultural effort as it is a technical one, and quality gates present the perfect opportunity to bridge the gap. Because they function within the bounds of regular DevOps processes, tools that bake security into the CI/CD pipeline by way of quality gates are more likely to win DevOps teams over.
Oct 26, 2018   |  By Tripwire
Learn how Log Management can complement SIEM, Security Analytics and Big Data tools within your organization.
Oct 26, 2018   |  By Tripwire
Establish and sustain the Four Essential Pillars of Federal Cybersecurity
Oct 1, 2018   |  By Tripwire
How to introduce security without losing the benefits of containers.
Nov 12, 2019   |  By Tripwire
Tripwire File Analyzer is tightly integrated with Tripwire Enterprise to add valuable context by revealing the behavior of files. Learn more here:
Oct 29, 2019   |  By Tripwire
As cloud adoption matures, many organizations still struggle to determine the best approach for their environment. Tim Erlin, VP of Product Management and Strategy at Tripwire, breaks down what differentiates hybrid cloud from multi-cloud, and how enterprises are utilizing both to meet their needs.
Oct 23, 2019   |  By Tripwire
In this on-demand webcast, hear from industry experts Tim Erlin (Tripwire VP of Product Management and Strategy) and Thom Langford (experienced CISO and Founder of (TL)2 Security Ltd) as they discuss the top traits needed by successful CISOs today.
Oct 22, 2019   |  By Tripwire
The role of the CISO is constantly evolving. What does it take to properly manage and oversee the cybersecurity needs of an organization? Thom Langford, Founder of (TL)2 Security and former CISO, highlights five must-have traits needed by successful CISOs today.
Oct 21, 2019   |  By Tripwire
Building your own threat hunting program doesn't always involve using expensive, hard to use programs. Travis Smith, Security Researcher at Tripwire Inc. explains how to use easy to find open source tools such as MITRE ATT&CK to create your own threat hunting program.