Tripwire
Follow
2248 Followers
Follow Tripwire on their other social channels!
About Us
Founded:
1997
Company Size:
201-500 employees
Company Type:
Private
Location:
Portland, OR
Website:
Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operation solutions for enterprises, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; ...
Read more
Promoted Content
18 Expert Tips for Effective and Secure Cloud Migration
Follow
A Look at the 2018 Verizon DBIR: Key Takeaways and Industry Highlights
Now in its 11th installment, Verizon’s Data Breach Investigations Report (DBIR) is a must-read for cybersecurity professionals across the globe. The 2018 edition dives deep into more than 53,000 real incidents and 2,216 confirmed data breaches with the ultimate goal of informing defenders on the threats they face and how to protect against them. The […]… Read More The post A Look at the 2018 Verizon DBIR: Key Takeaways and Industry Highlights appeared first on The State ...
Follow
A Look Inside the April Update to the MITRE ATT&CK Framework
The MITRE ATT&CK Framework is an excellent resource when it comes to defining threat intelligence. The hundreds of techniques mapped across various tactics help define an adversary’s behaviors in enterprise networks. What’s better is that it provides prescriptive level guidance on how to both mitigate and detect the techniques. While it is not complete, the […]… Read More The post A Look Inside the April Update to the MITRE ATT&CK Framework appeared first o ...
Follow
Excel pivot table data leak leads to £120,000 fine for London council
A London council has been fined £120,000 for accidentally revealing the names of people who owned empty properties. An error that could have been avoided with a simple double-click. The post Excel pivot table data leak leads to £120,000 fine for London council appeared first on The State of Security.
Follow
20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobi
Today, I will be going over Control 5 from version 7 of the CIS top 20 Critical Security Controls – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. I will go through the five requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 5 More than […]… Read More The post 20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptop ...
Follow
#TripwireBookClub – Attacking Network Protocols
A while ago, I had the crazy idea that I needed to read more technical books, so I purchased a pair of books that appealed to me: Attacking Network Protocols and Serious Cryptography, both published by No Starch Press. I was interested in reading along with others and sharing our thoughts and opinions, so I […]… Read More The post #TripwireBookClub – Attacking Network Protocols appeared first on The State of Security.
Follow
70 Percent of Energy Security Pros Fear Digital Attacks Could Produce a “Catastrophic Failure”
Digital attackers are targeting organizations in the energy sector like never before. For example, just a few weeks ago, the FBI and Department of Homeland Security issued a joint report describing a massive Russian hacking campaign to infiltrate America’s critical infrastructure. In a first, the US government publicly blamed Russia’s government for attacks on energy infrastructure. […]… Read More The post 70 Percent of Energy Security Pros Fear Digital Attack ...
Follow
GDPR Is Coming, So What Now for WHOIS Domain Registration Data?
When the European Union General Data Protection Regulation (GDPR) comes into force on May 25, 2018, what will happen to currently-available domain registration data in WHOIS? The GDPR restricts how personal data about natural persons residing in the European Union can be collected, used and transferred, and it defines “personal data” very broadly. Today, anyone […]… Read More The post GDPR Is Coming, So What Now for WHOIS Domain Registration Data? appeared first on ...
Follow
20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs
Today, I will be going over Control 6 from version 7 of the CIS top 20 Critical Security Controls – Maintenance, Monitoring, and Analysis of Audit Logs. I will go through the eight requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 6 Logs are the lifeblood of security. I like […]… Read More The post 20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs appeared first on The State of Securi ...
Follow
DevSecOps Survey Reveals Heightened Interest In Automated Security
The 5th annual DevSecOps community survey for 2018 from Sonatype reveals heightened interest in DevSecOps practices after the recent surge of high profile breaches as well as highlights security integration statistics among teams with mature DevSecOps workflows. In this blog post, we’ll discuss some of the important findings from the survey of 2,076 IT professionals […]… Read More The post DevSecOps Survey Reveals Heightened Interest In Automated Security appeared first ...
Follow
20 Critical Security Controls: Control 7 – Email and Web Browser Protections
Today, I will be going over Control 7 from version 7 of the CIS top 20 Critical Security Controls – Email and Web Browser Protections. I will go through the 10 requirements and offer my thoughts on what I’ve found. Key Takeaways for Control 7 Why not block images from emails? Embedded single pixel tracking […]… Read More The post 20 Critical Security Controls: Control 7 – Email and Web Browser Protections appeared first on The State of Security.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel