Profile cover photo
Profile photo
Tripwire, Inc.
789 followers
789 followers
About
Posts

Post has attachment
It is a well-known fact that legacy equipment shall continue to play a crucial role in the continuity and stability of critical infrastructure, especially in industrial control systems. A recent Center for Digital Government survey found that 70% of respondent agencies depend on legacy infrastructure for their operations.
Add a comment...

Post has attachment
In the healthcare industry, data sets are growing rapidly, both in volume and complexity, as the sources and types of data keep on multiplying.
Add a comment...

Post has attachment
At this point, the Center for Internet Security’s Security Controls are an industry standard for technical cyber security. The first six basic controls can prevent 85 percent of the most common cyber attacks, and even though the controls have been developed with traditional data centers and process in mind, there is no reason they can’t be adapted to DevOps.
Add a comment...

Post has attachment
Arm yourself with consensus and understanding in the three following areas to avoid falling into No Man’s Land.
Add a comment...

Post has attachment
Local authorities are currently investigating a data breach at a Chinese hotel group that could have exposed customers’ personal information.
Add a comment...

Post has attachment
Container security is not a unitary action but a multifaceted process. It involves securing the build environment using secure code control and other strategies. The procedure also necessitates securing containers’ contents via code analysis and unit tests.
Add a comment...

Post has attachment
Air Canada announced on Wednesday that approximately 20,000 customers may have had their personal information compromised after a data breach in its mobile app. As a result, the airline says it locked down all 1.7 million accounts until users update their passwords.
Add a comment...

Post has attachment
There’s no doubt about it, attackers want your credentials more than anything, especially administrative credentials. Why burn a zero-day or risk noisy exploits when you can just log in instead? If you were to break into a house, would you rather throw a brick through a window or use a key to the front door?
Add a comment...

Post has attachment
Back in the good old days, we used to have to order physical servers to run our applications. When servers became too expensive, we found efficiency in virtualization. Why have one box running one server when I could have 10 or more on a single box? ...
Add a comment...

Post has attachment
The Bank of Spain revealed that bad actors used a denial-of-service (DoS) attack to temporarily disrupt access to its website.
Add a comment...
Wait while more posts are being loaded