Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Threat Actors in Critical Infrastructure: New Trends and Risk Factors

In this on-demand webcast, guest presenter Mike Chaney, who supports the DHS, National Cybersecurity & Communications Integration Center (NCCIC), and David Meltzer, Tripwire CTO, will share best practices to reduce the likelihood and severity of incidents that may significantly compromise the security and resilience of the critical infrastructure.

ITIL, Problem Management and Tripwire Enterprise

I’ve written about ITIL and Tripwire Enterprise, offering a secure approach to managing your Change Management processes, but ITIL’s guidelines offer more than just recommendations around ensuring changes happen as expected. Problem management is another key area where Tripwire Enterprise can help you on your ITIL journey. ITIL sensibly focuses on root-cause analysis for problem management.

How Employee Monitoring Keeps Clinical Trial Data Secure

Clinical trials are a crucial step in developing new life sciences products such as drugs and medical devices. All tests – whether with large or small groups of people – require medical and personal information from patients upfront, and then proceed to collect data throughout the process. Ultimately, research companies are responsible for large sets of sensitive data and securing that information should be a top priority.

Improving Threat Detection through Managed Security Service Providers (MSSPs)

Cybersecurity is a growing concern as breaches continue to increase in frequency and make headline news. Unfortunately, due to time and other constraints, many smaller businesses postpone the complicated task of risk management, only to eventually succumb to the devastating ramifications of a cyberattack. While the security solutions themselves appear complicated, the ability to mitigate risk is within reach of all.

Alert Fatigue Is a Big Cybersecurity Problem

Alarms and alerts surround us every day. From the moment our clocks wake us up in the morning, we rely on alarms for many things. But what happens when those alarms and alerts malfunction? What does it do to us and how does that affect our day to day life? Recall the Dallas Emergency Alert Malfunction. As it turns out, getting tired of these alarms can prove dangerous to cybersecurity.

Multi-Cloud Security Best Practices Guide

A multi-cloud network is a cloud network that consists of more than one cloud services provider. A straightforward type of multi-cloud network involves multiple infrastructure as a service (IaaS) vendors. For example, you could have some of your cloud network’s servers and physical network provided by Amazon Web Services (AWS), but you’ve integrated that with your servers and physical networking that’s provided by Microsoft Azure.

HTTPS and Chrome's Security Push

Last month, Google Chrome started marking all non-HTTPS sites as not secure. The main reason for this is because all non-HTTPS sites are insecure, so there is some logic to it. It was part of a plan announced way back in 2016 that sought to improve security across the Net. The first stage of this was to mark all HTTP sites that collect passwords or credit card details (and the like) as being insecure.

What's Data Got to Do with It? A Lot, Says Survey

Data drives us at Devo—and although most organizations would benefit from a more data-driven approach, recent research shows organizations are grappling with the challenges of accessing and using operational data for business benefit. Data volumes are continuing to grow, fueled by machine data from a multitude of sources. But there is often a significant gap between the volume of data collected and the operational benefits that can be gained from that data.