Profile cover photo
Profile photo
Tripwire, Inc.
789 followers
789 followers
About
Tripwire,'s posts

Post has attachment
The security community has seen multiple high-profile incidents targeting industrial control systems (ICS) over the past few years. No one can forget Christmas 2015, when a threat actor linked to the Russian government sent spear-phishing emails to the Western Ukrainian power company Prykarpattyaoblenergo.



Post has attachment
Though they may require different tools and skills to be truly understood, there are several lessons lock pickers can teach you about cyber security...

Post has attachment
According to recent research, the majority of Android devices are running security patches that are months old, leaving users vulnerable to attacks.



Post has attachment
Enterprises should consider security before they migrate to the cloud. But at the risk of being too vague, we must ask: what specific cloud security challenges pose a threat to enterprises? Let’s examine four security threats associated with the cloud that businesses should keep in mind...



Post has attachment
A pastry crimper is accused of swindling a retired divorcee out of £35,000 as part of a dating scam.



Post has attachment
Just as traditional brick-and-mortar businesses are targeted by anarchists during protests or times of unrest, e-commerce businesses are targeted by cyber criminals, except they don’t wait for particular season or reason.



Post has attachment
Integration with FIM, remediation workflows, and secure configuration policies improves the effectiveness of a SCM solution. But such convergence overlooks a chief consideration: how do organizations determine which assets they should monitor using SCM?



Post has attachment
Cerber ransomware is infecting unsuspecting users via malspam emails sent out by the “Blank Slate” attack campaign.



Post has attachment
The Russian author of the notorious Citadel malware which infected over 11 million PCs and stole an astonishing $500 million from bank accounts has pleaded guilty to his crimes.

via +Graham Cluley

Post has attachment
The enemy of security and availability is unplanned change. This can come from an advanced nation-state adversary, a malicious insider, or even a well-meaning and trusted employee. To increase security and decrease downtime, it’s critical to prepare for this unplanned change. 
Wait while more posts are being loaded