Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Who's Responsible for Industrial Cybersecurity and Securing OT Environments?

Who are the key stakeholders involved when it comes to securing OT environments? Kristen Polous, General Manager of Industrial Cybersecurity at Tripwire, discusses who should be responsible for ICS security and how these stakeholders can work together to address cyber risks.

The Biggest Challenge Affecting Industrial Cybersecurity Organizations

Implementing a robust cybersecurity program is no small feat, especially for critical infrastructure organizations. Kristen Polous, General Manager of Industrial Cybersecurity at Tripwire, shares the number one challenge affecting industrial cybersecurity customers today and how to overcome it.

What is Transport Layer Security?

Transport layer security (TLS for short) refers to a protocol that aims to offer authentication, data integrity and privacy during the communication between two different computer applications. Keep reading to learn why it is important for your organization. Every web developer aims to keep the communications conducted over the internet as safe as possible but despite all the good intentions, this is an involved task due to the flawed designs and sub par implementations of Transport Layer Security.

10 tips for working remotely

We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others. Working remotely can be challenging. I can offer some advice about working remotely, as I have worked both remotely and in a travel capacity for over 10 years, and I really love working that way. Here are a few things I regularly do to ensure success while still managing a work-life balance.

RiskRecon vs UpGuard Comparison

There are a lot of security ratings providers now, and choosing the right one can be overwhelming. That's why we wrote this post to make it as easy as possible to help you compare RiskRecon and UpGuard. Regardless of whether you're a CISO, Vice President of Security or an individual contributor, it's safe to say you understand how important cybersecurity risk management is.

Free Cyber Safety Resources during COVID-19

Whether you are reading this from somewhere in the United States or overseas, chances are you are doing it from the comfort of your home. Not because you chose to but because you were asked to do so in order to prevent Coronavirus disease 2019 (COVID-19) from spreading any further. If you are a parent, working remotely with your kids at home, you are probably facing additional challenges.

How Fortinet and Tigera Protect Kubernetes in the Enterprise

Container use continues to grow, and Kubernetes is the most widely adopted container orchestration system, managing nearly half of all container deployments.1 Successful integration of container services within the enterprise depends heavily on access to external resources such as databases, cloud services, third-party application programming interfaces (APIs), and other applications. All this egress activity must be controlled for security and compliance reasons.

Increasing Digital Volumes and Shifting ATM Usage Amid COVID-19: Are you ready?

As the Coronavirus (COVID-19) reality hits home, retail banks and credit unions all over the globe have been quick to respond to customer and employee safety concerns. In Canada last week, we witnessed the Big Six – Bank of Montreal, CIBC, National Bank of Canada, RBC, Scotiabank and TD – temporarily closing branches and encouraging customers to shift their interactions to ATMs, online and mobile banking channels.

Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1)

Last month, we hosted a webinar, Hunting for persistence using Elastic Security, where we examined some techniques that attackers use in the wild to maintain presence in their victim’s environment. In this two-part blog series, we’ll share the details of what was covered during our webinar with the goal of helping security practitioners improve their visibility of these offensive persistence techniques and help to undermine the efficacy of these attacks against their organization.