Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tripwire

CIS Control 09: Email and Web Browser Protections

Web browsers and email clients are used to interact with external and internal assets. Both applications can be used as a point of entry within an organization. Users of these applications can be manipulated using social engineering attacks. A successful social engineering attack needs to convince users to interact with malicious content. A successful attack could give an attacker an entry point within an organization. CIS Control 9 provides several safeguards to ensure the safety of external information.

Maximizing Security Data in Splunk with Tripwire's New App

In today’s data-driven world, collecting information is just the beginning. The real value lies in transforming raw data into actionable insights that drive decisions. For enterprise security, this means making data not only accessible but also organized, relevant, and easy to analyze.

Steps for Successful Vulnerability Management: Lessons from the Pitch

When I was younger, I played a variety of team sports and enjoyed competing against opponents with my teammates. Winning was always a matter of applying sound tactics and strategy, attacking and defending well and using a blend of skill, talent and luck.

Understanding the EU Cyber Resilience Act: A New Era for Digital Product Security

Cyber resilience is a constant topic of concern in technology and cybersecurity, as it approaches security from the standpoint of assuming that attacks are inevitable rather than solely attempting to prevent them. Layered cybersecurity is crucial to ensure comprehensive defense against a wide range of threats.

8 Emerging Cybersecurity Scams And Their Implications For The Future

Technological advances usually lead to a brighter future. While that may be true, these developments could also be used to refine and increase cybersecurity scams. Attackers do not care about who they target as long as they get people's and establishments' information and credentials. Cybersecurity professionals must be aware of the current scams plaguing the digital world and how to combat them. Here are a few examples and their implications for the future.

CIS Control 10: Malware Defenses

With the continuing rise of ransomware, malware defenses are more critical than ever before with regard to securing the enterprise. Anti-Malware technologies have become an afterthought in many organizations, a technology that they’ve always had, always used, and never really thought about. This control serves as a reminder that this technology is as critical as it ever was and lays out the minimum requirements for ensuring your malware defenses are up to the task.

Tech Support Scams Exploit Google Ads to Target Users

It's not a new technique, but that doesn't mean that cybercriminals cannot make rich rewards from SEO poisoning. SEO poisoning is the dark art of manipulating search engines to ensure that malware-laced adverts and dangerous websites appear high on users' results - often impersonating legitimate businesses and organisations. But the simplest way of all to get a malicious website in front of a potential victim is to create a Google advertising account, and buy your way to the top of the search results.

Avoiding Pitfalls in Vulnerability Management: Key Insights and Best Practices

Vulnerability management (VM) has always been a complex area of concern that requires continuous and active effort to work properly. This can make it challenging for organizations to maintain their VM strategies and solutions over time, as there are many angles to secure and processes to oversee. There are a wide range of potential ways that VM can go wrong, and it is essential for organizations to avoid the many pitfalls associated with it.

Cyber-Safe Shopping: Protect Yourself from Holiday Scams and Cyber Threats

The holiday shopping season is here, and while it brings excitement and joy, it also opens opportunities for cybercriminals to exploit unsuspecting shoppers. With more people buying gifts online and taking advantage of holiday deals, the risk of falling victim to cyberattacks increases. Whether you're shopping from your desktop, mobile device, or in-store, it's essential to be aware of common threats and take steps to protect yourself.