Tripwire
Follow
2146 Followers
Follow Tripwire on their other social channels!
About Us
Founded:
1997
Company Size:
201-500 employees
Company Type:
Private
Location:
Portland, OR
Website:
Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operation solutions for enterprises, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; ...
Read more
Promoted Content
SANS - Implementing the CIS Critical Security Controls
Follow
Disclosing Zero Days
Governments ought to disclose zero-day vulnerabilities and begin to collaborate to make digital disarmament more than just ‘a thing.’ The case for these policy changes is becoming increasingly clear as new public debates begin to take shape around online privacy, trust and the prevention of cyber conflict. However, much work lies ahead in correctly identifying […]… Read More The post Disclosing Zero Days appeared first on The State of Security.
Follow
Making Sense of the General Data Protection Regulation (GDPR)
The upcoming GDPR compliance deadline of May 2018 affects any organization across the world that collects, processes, or stores data on citizens of the European Union. The intent behind the GDPR is to better protect the privacy of EU citizens, and the mechanism to do so is through harmonizing the existing data privacy laws across […]… Read More The post Making Sense of the General Data Protection Regulation (GDPR) appeared first on The State of Security.
Follow
Women in Informaton Security: Lesley Carhart
The cybersecurity industry can be made stronger if we attract more women and non-males. I’ve had the pleasure of interviewing some in my series. I spoke to Dr. Jessica Barker, who advises organizations on information security and maintains a blog at Cyber.uk. Then I spoke to Emily Crose, a  network threat hunter. Most recently, I […]… Read More The post Women in Informaton Security: Lesley Carhart appeared first on The State of Security.
Follow
The Human Factor: Technology Changes Faster Than Humans
The title of this piece is quite obvious, but it is also an unappreciated fact. Consider for a moment the change we have seen over the last 30 years: access to cyberspace was scarce, often limited to enterprise users such as governments, educational institutions, and the largest corporation, whereas today, there are billions of users […]… Read More The post The Human Factor: Technology Changes Faster Than Humans appeared first on The State of Security.
Follow
72% of Employees Would Share Confidential Company Information, Finds Survey
A new survey found that nearly three in four employees would be willing to share sensitive, confidential or regulated company information under certain circumstances. Conducted by computer tech company Dell, the end-user security survey polled over 2,600 professionals who handle confidential data at companies with 250 or more employees. “In most cases, their motives are […]… Read More The post 72% of Employees Would Share Confidential Company Information, Finds Survey ap ...
Follow
HipChat Implements Partial Password Reset Due to Security Incident
The internal private online chat and instant messaging service HipChat has sent password reset instructions to some of its users because of a security incident. Ganesh Krishnan, Chief Security Officer for the Atlassian-owned platform, disclosed some information about the incident on 24 April. As quoted in a security notice released by HipChat: “This weekend our […]… Read More The post HipChat Implements Partial Password Reset Due to Security Incident appeared first on Th ...
Follow
The Top 5 Vendor-Neutral Cloud Security Certifications of 2017
Many organizations migrate to the cloud because of increased efficiency, data space, scalability, speed and other benefits. But cloud computing comes with its own security threats. To address these challenges, companies should create a hybrid cloud environment, confirm that their cloud security solution offers 24/7 monitoring and multi-layered defenses, and implement security measures like encryption, […]… Read More The post The Top 5 Vendor-Neutral Cloud Security Certificatio ...
Follow
Russian Man Sentenced to 27 Years in Prison for Hacking Charges
A Russian man has received a sentence of 27 years in prison for hacking into American businesses and causing hundreds of millions of dollars in damages. On 21 April, the Federal District Court of Seattle sentenced Roman Valerevich Seleznev>, 32, to 27 years in prison – the longest sentence imposed for hacking-related charges in the United […]… Read More The post Russian Man Sentenced to 27 Years in Prison for Hacking Charges appeared first on The State of Securit ...
Follow
5 Tips for a Winning Security Project Business Case
Make no mistake: just like watching a perfect ballet performance, success is attributed to the hard work done behind the scenes. Only the best are chosen. The same goes for preparing and submitting a security project business case. Securing funding for a security project starts with a credible and comprehensive business case that not only […]… Read More The post 5 Tips for a Winning Security Project Business Case appeared first on The State of Security.
Follow
Don’t Click on a Delta Air Lines Receipt with No Flight Information!
Fraudsters are using fake Delta Air Lines receipts that lack any flight information whatsoever to infect unsuspecting users with malware. An attack begins when a user receives a fake payment confirmation email from Delta Airlines. Notice anything missing? The senders of the email don’t include any flight information in the message’s body, something that you […]… Read More The post Don’t Click on a Delta Air Lines Receipt with No Flight Information! appeared f ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel