Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol’ floppy disks to today’s cloud storage solutions, advancements in storage have slashed costs and allowed organizations to hold exponentially more data. And we are all taking advantage of this. In fact, data is proliferating at a staggering 25% annually. This presents a double-edged sword. On the one hand, this vast data lake holds immense potential for valuable insights.

Top 10 data governance tools for 2024

While artificial intelligence and big data steal the spotlight, a less glamorous but equally crucial discipline is quietly shaping the future of business: data governance. With European regulators imposing fines of up to 17.29 million pounds for data mismanagement, it’s clear that data governance is not just a compliance checkbox. It’s a strategic investment that can empower your organization with a tangible return on investment.

The Power of Tripwire Enterprise SCM Policies

There are many good business, security, and compliance reasons for leveraging the extensive rule and policy engines of Fortra’s Tripwire Enterprise (TE) to implement Security Configuration Management (SCM) capabilities, which have been documented very well in other blogs. In contrast, this article deals more with “how can we fully leverage this capability” technically instead of “why” we use them.

Navigating Change: Three Levels to Filter Out the Noise in Tech Environments

Change is relentless. Technology evolves at breakneck speed, and security practitioners face a constant barrage of updates, system tweaks, and new tools. This relentless stream of modifications can create a clutter of information, making it challenging to pinpoint what is truly important. Effectively filtering through this noise through effective change management is critical for maintaining operational efficiency and security.

Using Honey Tokens for Threat Detection with Netwrix Threat Manager

Today, cyberattacks are no longer a matter of if, but when. Spotting malicious actors before they can do damage requires a proactive approach. One effective strategy is to use honey tokens. This article explains what honey tokens are and how Netwrix Threat Manager enables organizations to easily create and use them to gain the threat intelligence they need to shut down attacks and improve their security posture.

Identifying Common Open Port Vulnerabilities in Your Network

When intruders want to break into an establishment, they look for an opening. An open port is one of the openings that a hacker or threat actor looks for to access a digital network. That open port may be on a firewall, a server, or any network-connected computing device. Just as a single unlocked door can jeopardize your privacy and grant access to a physical building, a single open port can provide a point for hackers to breach your systems, exposing you to their malicious intents.

TrustedInstaller - with great power comes great responsibility

TrustedInstaller is a Windows system account with special high-level permissions allowing it to modify certain system files, folders, and registry settings. It also prevents any account including administrator accounts from modifying these files and folders. Trustedinstaller.exe is a Windows Module Installer service, a part of Windows Resource Protection (WRP), which restricts access to core system files and folders preventing them from being modified or replaced.