Profile

Cover photo
Tripwire, Inc.
Works at Tripwire Inc
Lives in Portland, OR
606 followers|162,290 views
AboutPostsPhotosYouTube

Stream

Tripwire, Inc.

Shared publicly  - 
 
Imperva has published some pretty interesting research on how an attacker might use cloud-based file synchronization services to exfiltrate data and deliver malware to systems inside an organization.
Tripwire Enterprise provides a high level of detection capability for compromises like man-in-the-cloud attacks that other tools claim are “hard to detect.”
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Netflix has released a new tool called Sleepy Puppy that helps security researchers capture, manage, and track cross-site scripting (XSS) propagation over extended periods of time.
Netflix has released a new tool called Sleepy Puppy that helps security researchers capture, manage, and track XSS propagation over long periods of time.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
If you happen to own the Samsung RF28HMELBSR, you have a reason to be concerned and probably shouldn’t take the device to your local Starbucks. Researchers from Pen Test Partners found the device didn’t validate SSL certificates, thus making it vulnerable to man-in-the-middle attacks.
I can be a bit of a Luddite when it comes to the IoT: do your fridge, your washing machine and your light bulbs really need an Internet connection?
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Tripwire senior security analyst Ken Westin recently gave a popular presentation at DEF CON 23 called “Confessions of a Professional Cyber Stalker.”  In his presentation, Ken discussed the various technologies and methods he has developed to track criminals, which has led to at least two dozen convictions.
Tripwire senior security analyst Ken Westin, recently gave a popular presentation at DEF CON 23 called “Confessions of a Professional Cyber Stalker.”
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Cyber attacks are becoming more frequent and more sophisticated each day. Cyber criminals are always changing their approach and tactics, and zero-day malware can slip by your network perimeter defenses and/or enter your environment via a laptop, USB, or even a mobile device.
To meet today's ever-evolving threats, organizations need an in-depth defense solution that integrates network and endpoint security together.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Ashley Madison has made headline after headline in recent weeks after a hacking group penetrated its servers and published the information of all 37 million users online. This timeline recounts all of the major developments of this ongoing breach.
Ashley Madison made headlines in recent weeks after a hacking group penetrated its servers and published the information of all 37 million users online.
1
Add a comment...
Have them in circles
606 people
andi rantau's profile photo
Adrian Borlea's profile photo
Brent Huston's profile photo
Michael Farnum's profile photo
Laura Noe's profile photo
Erskine S Weekes Libert's profile photo
Lori MacVittie's profile photo
Shane Daniels's profile photo
Michael Douglas's profile photo

Tripwire, Inc.

Shared publicly  - 
 
According to recent research, employees in the finance and human resources departments are seen as the mostly likely to cause a data breach.
According to recent research, employees in the finance and human resources departments are seen as the mostly likely to cause a data breach.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
IBM’s 2014 Cyber Security Intelligence Index found that 95 percent of all security incidents involve human error, and Gartner predicts by 2017, “75 percent of mobile security breaches will be the result of mobile application misconfiguration”.
Security practitioners need to give serious consideration to DevOps and SDN to reduce the mistakes that cause the breaches that make the headlines.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
A former United States Secret Service Agent has admitted in court that he stole Bitcoin from drug dealers and attempted to hinder an investigation into Silk Road, the underground dark web market.
A former Secret Service Agent has admitted in court that he stole Bitcoin from drug dealers and attempted to hinder an investigation into Silk Road.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
Attackers are looking for systems that have default settings that are immediately vulnerable. Once an attacker exploits a system, they start making changes. These two reasons are why Security Configuration Management (SCM) is so important.
Once an organization inventories its hardware and software, the most important concern is security configuration management.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
British retailer WHSmith has suffered a data breach that has resulted in users’ personally identifiable information (PII) being sent out to hundreds of customers’ inboxes.
British retailer WHSmith has suffered a data breach that has resulted in users' personal information being sent out to hundreds of customers' inboxes.
1
Add a comment...

Tripwire, Inc.

Shared publicly  - 
 
North Dakota was named the first U.S. state authorizing local police departments to fly drones with “less-than-lethal” weapons, including tasers, sound cannons, teargas and non-penetrating firearms, after the passage of House Bill 1328 last week.
North Dakota was named the first U.S. state authorizing local police departments to fly drones with “less-than-lethal” weapons.
1
Add a comment...
People
Have them in circles
606 people
andi rantau's profile photo
Adrian Borlea's profile photo
Brent Huston's profile photo
Michael Farnum's profile photo
Laura Noe's profile photo
Erskine S Weekes Libert's profile photo
Lori MacVittie's profile photo
Shane Daniels's profile photo
Michael Douglas's profile photo
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Portland, OR
Work
Occupation
Enterprise Security
Skills
configuration management, file integrity monitoring, log and event management, and vulnerability management
Employment
  • Tripwire Inc
    Social Media, 2010 - present
    Tripwire is a leading provider of advanced threat security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.