In this two-minute clip, Travis Smith, Principal Security Researcher at Tripwire, gives an overview of the MITRE ATT&CK framework and how organizations can leverage the tool to stay ahead of adversaries.
In this interview with SecurityGuyTV.com, Tripwire CTO David Meltzer talks about the evolution of Tripwire, the cybersecurity industry, and the biggest threats and challenges organizations are faced with today.
Sophisticated data theft and other covert malicious actions by Insiders can involve covering their tracks with tools to erase data, hide data or even appear to be activities other than what actually occurred.
Vulnerabilities are everywhere—and they’re not going away anytime soon. Zoë Rose, cybersecurity consultant at Baringa Partners, tells us why effective vulnerability management should be a vital part of your overall security posture.
The biggest cyber threat is not the latest zero-day or fast-spreading malware. Cybersecurity consultant Zoë Rose explains what affects our industry the most and what security professionals can do about it now.
Ever wonder what it’s like to be an “ethical hacker?” Zoë Rose walks us through a typical day in her life as an ethical hacker/cybersecurity consultant at Baringa Partners.
How do you know your VM program is effective? In this video, Tim Erlin, VP of product management & strategy at Tripwire, highlights seven habits to help you get the most out of your efforts to manage and reduce vulnerability risk.
We partnered with Planning Center, a California based church management software company, and provided them Data Privacy Services including GDPR, Data Protection Officer as a Service and Privacy by Design.
ICS security is always changing. Whatever challenges there are today won’t be the challenges of tomorrow. That begs the question: what will have the greatest impact on ICS security in the next 5-10 years?