Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

From Days To Minutes: Digital Media Provider Uses Forward Networks To Overhaul Reconciliation

Editor's Note: As leader of our customer success team, Yadhu works directly with our users and their leadership to solve real-world technology problems. This blog is the first of a new series featuring how our customers are using the Forward Enterprise platform to deliver business value. Enterprise IT teams around the world are frustratingly familiar with the process of vendor contract reconciliation, the annual process of ensuring that the support contracts for devices in the network are accurate.

58% of Orgs Are Using a Vulnerable Version of Log4j

On December 9, 2021, a zero-day vulnerability in Log4j 2.x was discovered. This vulnerability is of great concern because if it’s successfully exploited, attackers are able to perform a RCE (Remote Code Execution) attack and compromise the affected server. Since we are a cloud-based Software Composition Analysis (SCA) provider, we have useful customer data that gives insight into the scope of the Log4j vulnerability.

Addressing Log4j2 Vulnerabilities: How Tripwire Can Help

On December 9th 2021, Apache published a zero-day vulnerability (CVE-2021-44228) for Apache Log4j being referred to as “Log4Shell.” This vulnerability has been classified as “Critical” with a CVSS score of 10, allowing for Remote Code Execution with system-level privileges. If you are currently working to identify instances of this vulnerability, Tripwire can help.

Cybersecurity Standards, Ransomware, and Zero Trust: 3 Key Considerations for the UK Government

In September 2021, Tripwire released its annual report to examine the actions taken by the U.S. federal government to improve cybersecurity. The report also looks at non-government organizations so that we may catch a glimpse of the differing views and approaches of each, which makes for interesting (and revealing) insights.

Sponsored Post

How to Manage Your AIOps for Optimal Efficiency

“Have you tried shutting it off and turning it back on?” While AIOps won’t likely remove this query from our vocabulary any time soon, technology is certainly here to take on a bulk of the heavy lifting. For all-sized companies, service calls are still going to continue to pour in. And, there’s no sign of any of the world’s CompTIA certs going to waste in the near future. Still, thanks to AIOps, many jobs within the world of IT will become more streamlined.

Close Out Construction Projects Without the Administrative Hassle

Properly closing out construction projects can be a major administrative hassle that takes time away from more productive tasks. Not only do you have to identify and retain your contracts, warranties, and proof of completions, but you also must remove team members who no longer require access to systems and folders. It’s typically a very manual process—but it doesn’t have to be.

Easily Find and Secure Sensitive Data in Gmail with Egnyte

Gmail is an immensely popular service, with nearly 2 billion active accounts. And as the service has grown, businesses have turned to it for all kinds of things it was never meant to do: user authentication, password recovery, and perhaps most problematic, the passing of sensitive or regulated data between parties.