Profile

Cover photo
Tripwire, Inc.
Works at Tripwire Inc
Lives in Portland, OR
587 followers|148,202 views
AboutPostsPhotosYouTube

Stream

Tripwire, Inc.

Shared publicly  - 
 
A hacker is demanding 9.5 BTC in return for not publicly releasing user data stolen from Plex, an application that allows users to organize media files and stream them to their computer screens.
A hacker is demanding 9.5 BTC in return for not publicly releasing user data stolen from the media streaming application Plex.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
The FUD Wagon is rolling strong today after multiple online media outlets have picked up the story that Wi-Fi Sense, available on Windows Phone 8.1 and the soon to be released Windows 10, is Microsoft’s latest security blunder.
The FUD Wagon is rolling strong today after multiple online media outlets have picked up the story that Wi-Fi Sense is Microsoft’s latest security blunder.
2
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Looking for a great Information Security podcast? There are plenty to choose from! Here’s a roundup of currently active Information Security podcasts.
Here's a roundup of active Information Security podcasts, which includes Tripwire's Security Slice podcast, for the mid-2015 season.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Criminal hackers may have added to the headaches of The Donald, whose chain of luxury hotels have been hit by what appears to be a major credit card breach.
by +Graham Cluley 
Hackers may have added to the headaches of Donald Trump, whose chain of luxury hotels have been hit by what appears to be a major credit card breach.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
A security firm has spotted a new spam campaign that seeks to trick email users into downloading Dridex banking malware.
A security firm has spotted a new spam campaign that seeks to trick email users into downloading Dridex banking malware.
2
1
Vic du Toit's profile photo
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
With the advent of the recent failure of RBS banking systems, there is a question on the lips of many security professionals, not to mention the aware members of the public, asking: “Are today’s banking systems and the applied management fit for purpose?”
In light of the recent failure of the RBS IT systems, we are led to ask, “Are today's banking systems and the applied management fit for purpose?”
1
Add a comment...
In their circles
719 people
Have them in circles
587 people
Laura Noe's profile photo
Ameritarian ism's profile photo
Dominique Karg's profile photo
oluwole femi's profile photo
Carlos Said's profile photo
Anne van Rossum's profile photo
Michael Mazibuko's profile photo
Michael Rennie's profile photo
Adrian Clark's profile photo

Tripwire, Inc.

Shared publicly  - 
 
Victims of the massive breach at the Office of Personnel Management (OPM) are being warned to remain cautious of scammers posing as official communication from the agency.
Victims of the massive breach at OPM are being warned to remain cautious of scammers posing as official communication from the agency.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Harvard University has revealed that it discovered a breach of its IT systems back on June 19th, an incident which is believed to have affected eight separate schools and administrative organizations.
Harvard University has revealed that it discovered a breach of its IT systems back on June 19th.
2
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Clearly, with days to go, you’ve assessed the business impacts of not migrating your Windows Servers 2003 and the business-critical applications running on them to a newer OS or cloud environment.
IT teams and leadership can take steps to make sure business leaders are informed of the impacts of continuing to conduct business using WS2003 systems.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Phishing continues to be leveraged by criminals as a ‘tried and true’ tactic to deceiving everyday users and organizations. Here are a few tips to help protect yourself against these scams and avoid the bait.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Last week, a private investigator was sentenced for having hired “hacking services” to gain unauthorized access to victims’ email accounts on the behalf of his clients.
Last week, a private investigator was sentenced for having hired "hacking services" to gain unauthorized access to victims' email accounts.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
According to a group of security researchers, commercial Virtual Private Network (VPN) services, claiming to provide users enhanced privacy and anonymity, may not be as secure as users think.
Commercial Virtual Private Network (VPN) services, claiming to provide users enhanced privacy and anonymity, may not be as secure as users think.
1
Add a comment...
People
In their circles
719 people
Have them in circles
587 people
Laura Noe's profile photo
Ameritarian ism's profile photo
Dominique Karg's profile photo
oluwole femi's profile photo
Carlos Said's profile photo
Anne van Rossum's profile photo
Michael Mazibuko's profile photo
Michael Rennie's profile photo
Adrian Clark's profile photo
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Portland, OR
Work
Occupation
Enterprise Security
Skills
configuration management, file integrity monitoring, log and event management, and vulnerability management
Employment
  • Tripwire Inc
    Social Media, 2010 - present
    Tripwire is a leading provider of advanced threat security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.