Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

The Power of Vulnerability Management: Are You Maximizing Its Value?

Tripwire has been in the business of providing vulnerability management solutions with IP360 for about 20 years. With over 20,000 vulnerabilities discovered last year alone, vulnerability management continues to be an important part of most security plans. And most organizations agree.

Understanding Vulnerability Scoring to Help Measure Risk

Understanding vulnerability scoring can be a daunting task, but a good starting point is first understanding risk and being able to distinguish risk from a vulnerability. Both have been used interchangeably throughout the years. A vulnerability is some aspect of a systems functioning, configuration or architecture that makes the resource a target of potential misuse, exploitation or denial of service.

What's better: On-site SIEM or MSSP SIEM?

If an organization properly implements a SIEM solution, it efficiently draws attention towards warning signs as well as suspicious activity within the network. With the ever-evolving cyber space, continuous security monitoring has become exceedingly important. The benefits of SIEM also extend to understanding business and technology environments, monitoring availability and performance, issue diagnosis, and creation of a report on network activities.

How to Ensure Network Security?

With a colossal surge in cyber-attacks and high reliance on technology in this digital age, ensuring the security of data and information have become a daunting task. Cyber threats are accelerating significantly even faster than the enhancements businesses are making. Computer networks have become bigger and their interconnectivity using a Wide Area Network (WAN) is worldwide due to globalization.

Meet the Hacker: EdOverflow, motivated by community and knowledge sharing

EdOverflow is known for contributing a bunch of stuff: active in the community, one of the people behind security.txt – a standard for structuring responsible disclosures, bug bounty hunter and a member of Detectify Crowdsource. We got a chance to quiz him about security.txt, his motivates for being involved with hacking communities and why he chooses to report to responsible disclosure programs without bounty rewards.

There is no Artificial Intelligence without Machine Learning

Machine learning (ML) technology has the potential to generate tremendous value for businesses. It is already proving itself in the market and powering a growing number of tools across virtually every industry. In order to discuss the current capabilities of ML, we must first examine how it relates to artificial intelligence (AI). Then, we can explore where ML software is today, its real-world applications, and how it’s transforming business.

How To Embrace Employee Monitoring Without Compromising Culture

The modern workforce looks a lot different than it did even a decade ago. If employees actually go to a physical office, their workplaces are often defined by open concepts, collaboration and frequent communication. None of this is by accident. Studies consistently show that happy employees are more productive employees, and autonomy and access are two factors that can make employees happy.

Student Data Privacy Laws by State

Most educators know about the federal student data privacy laws such as the Family Educational Rights and Privacy Act (FERPA) administered by the US Department of Education. However, modern schools increasingly adopt new technologies such as cloud service providers for managing everything from homework assignments in Google Drive to education data in records management data systems.