Tripwire
Follow
2175 Followers
Follow Tripwire on their other social channels!
About Us
Founded:
1997
Company Size:
201-500 employees
Company Type:
Private
Location:
Portland, OR
Website:
Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operation solutions for enterprises, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; ...
Read more
Promoted Content
SANS White Paper: Focusing on the First Six Critical Security Controls
Follow
Petya Ransomware Outbreak Hits Ukraine, Russia, and Europe
A new variant of Petya ransomware has reportedly struck banks, airports, and power utilities in an apparent outbreak affecting Ukraine, Russia, and parts of Europe. Ukraine’s national bank, state power company, and airport appear to have been some of the attack campaign’s first victims. In a statement, the National Bank of Ukraine attributed the event […]… Read More The post Petya Ransomware Outbreak Hits Ukraine, Russia, and Europe appeared first on The State of S ...
Follow
Windows XP Spotted Running Aboard Royal Navy Aircraft Carrier
A new aircraft carrier built for the Royal Navy appears to be running the outdated 2001 Windows XP operating system on at least some of its machines. During a tour of the £3.5 billion HMS Queen Elizabeth, someone reportedly spotted a screen inside the aircraft carrier’s control room running Windows XP. Microsoft hasn’t supported this […]… Read More The post Windows XP Spotted Running Aboard Royal Navy Aircraft Carrier appeared first on The State of Security.
Follow
For Your Eyes Only: Why Data Masking Needs to Be in Every Data Security Strategy
Data security is rife with complexities. The threats against an organization’s data are massive and ever-evolving, and the consequences of a breach are devastating, sometimes crippling, for a business, so it’s unsurprising that there are dozens if not hundreds of factors to be taken into consideration when it comes to securing databases. That’s why it’s […]… Read More The post For Your Eyes Only: Why Data Masking Needs to Be in Every Data Security Strat ...
Follow
Book Review: Ghost in The Wires – Kevin Mitnick
While attending the RSA show in February, I met Kevin (@KevinMitnick) and obtained a copy of The Art of Invisibility, which I immediately read. Due to the great many references to Kevin’s past, I thought it would be informative and worthwhile to read Ghost in the Wires. It’s also listed on the Tripwire 10 must-read […]… Read More The post Book Review: Ghost in The Wires – Kevin Mitnick appeared first on The State of Security.
Follow
Anthem to Pay $115 Million to Settle Class-Action Lawsuit Over 2015 Data Breach
Anthem has agreed to pay $115 million to settle a class-action lawsuit over the 2015 data breach that compromised the personal information of nearly 80 million customers. If approved, the proposed settlement – which will be heard in a federal court next month – would be the largest ever in regards to data theft. The […]… Read More The post Anthem to Pay $115 Million to Settle Class-Action Lawsuit Over 2015 Data Breach appeared first on The State of Security.
Follow
Koler Ransomware Using Fake Adult-Themed Apps to Infect U.S. Android Users
Koler ransomware is masquerading as fake adult-themed apps to infect unsuspecting Android users based in the United States. An infection begins when a user visits a suspicious adult-themed website. The attack campaign says the user must download an app for a popular adult site to view their desired content. But the app is a fake. […]… Read More The post Koler Ransomware Using Fake Adult-Themed Apps to Infect U.S. Android Users appeared first on The State of Security.
Follow
How a Nation Should Respond to Global Cybersecurity Threats
Today, the major threats facing every nation in the world are digital in nature. In response, most – if not all – countries implement serious measures to counter these threats and enhance the overall security of their networks. As such, securing cyberspace is a high priority today for every country’s administration, but not all of […]… Read More The post How a Nation Should Respond to Global Cybersecurity Threats appeared first on The State of Security.
Follow
Hacked IoT Devices Attacked Honeypots after ‘Just a Few Seconds’ of Web Connectivity
It’s no secret attackers used insufficient IoT security to their advantage in 2016. Who can forget October 21? On that day, multiple distributed denial-of-service (DDoS) attacks struck the internet performance management company Dyn, a multi-pronged offensive which caused Etsy, Spotify, Twitter and other large web services to suffer connectivity issues and service interruptions. The security […]… Read More The post Hacked IoT Devices Attacked Honeypots after ‘Just ...
Follow
800K Virgin Media Users Told to Change Passwords over Hacking Risk
Virgin Media is advising 800,000 of its customers to change their router passwords over the fear that attackers could easily hack their devices. On 23 June 2017, consumer choice advocacy organization Which? published the results of an investigation it conducted to analyze the security of connected devices in the home. It set up wireless cameras, […]… Read More The post 800K Virgin Media Users Told to Change Passwords over Hacking Risk appeared first on The State of Security.
Follow
Australia Cyber Security Strategy: SWOT Analysis
In April 2016, the government of Australia forwarded a cyber security strategy proposal to solidify its cyber space and fend off the increasing digital threats hurled by enemy states, cybercriminal organizations, and amateur opportunists. In the digital age where cyber-attacks are increasing every year, it is imperative that we have a stringent cyber security plan […]… Read More The post Australia Cyber Security Strategy: SWOT Analysis appeared first on The State of Security.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel