Blog
VERT Threat Alert: September 2022 Patch Tuesday Analysis
By Tyler Reguly on Tue, 09/13/2022
Image
Today’s VERT Alert addresses Microsoft’s September 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1021 on Wednesday, September 14th.
In-The-Wild & Disclosed CVEs
CVE-2022-23960
The first disclosed vulnerability this month is Spectre-BHB that is discussed in great...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 5, 2022
By Andrew Swoboda on Mon, 09/12/2022
Image
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of September 5th, 2022. I’ve also included some comments on these stories.
Critical RCE Vulnerability...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 29, 2022
By Andrew Swoboda on Mon, 09/05/2022
Image
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 29th, 2022. I’ve also included some comments on these stories.
WordPress 6.0.2 Patches...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 22, 2022
By Andrew Swoboda on Mon, 08/29/2022
Image
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 22nd, 2022, including some commentary of mine.
VMware fixed a privilege escalation issue in...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 15, 2022
By Andrew Swoboda on Mon, 08/22/2022
Image
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 15th, 2022. I’ve also included some comments on these stories.
Newly Uncovered PyPI Package...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 8, 2022
By Andrew Swoboda on Tue, 08/16/2022
Image
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 8st, 2022. I’ve also included some comments on these stories.
Slack leaked hashed passwords...
On-Demand Webinar
How to Protect Against the Ransomware Epidemic
Mon, 08/15/2022
Ransomware has developed from a niche attack to a booming criminal market over the last year because the simple, turn-key business model behind ransomware infections doesn’t require any real technical skill to execute. As a result ransomware will continue to evolve and will continue to escalate for the foreseeable future.
The good news is that there are simple steps you can...
Guide
Verizon 2021 DBIR Response Checklist
The Verizon 2021 Data Breach Investigations Report (DBIR), which takes a deep dive into data-driven findings on the state of global cybersecurity across a number of industries, including manufacturing, healthcare, financial and public administration. This year’s report revealed trends behind 79,635 cybersecurity incidents and 5,258 confirmed data breaches across 88 countries.
...
Guide
Vulnerability Management Buyer's Guide
Most organizations understand the critical role that vulnerability management (VM) plays in helping them meet compliance requirements, ensure security and reduce risk. However, many organizations discover, only after investing in a solution, that it doesn’t properly address their needs. Avoiding this costly mistake can be difficult though, because at first glance many VM...
Guide
Climbing Vulnerability Management Mountain
Building your organization’s vulnerability management program is a daunting yet rewarding journey, similar to climbing a mountain. Doing this takes time, planning and hard work, but will be worth it when you get to the top.
To help you take on this challenge, Tripwire has outlined the five maturity levels you will use as your guide when building your program. Learn about how...
Guide
Tripwire State of Cyber Hygiene Report
Tripwire’s State of Cyber Hygiene report reveals the results of an extensive cybersecurity survey conducted in partnership with Dimensional Research. The survey examined if and how organizations are implementing security controls that the Center for Internet Security (CIS) refers to as "Cyber Hygiene."
Real-world breaches and security incidents prove over and over again that...
Guide
A Tripwire Zero Trust Reference Architecture
The concept of Zero Trust Architecture is fairly straightforward. Networks and systems have been traditionally designed with the assumption that everybody inside a defined perimeter can be trusted and that everybody outside that perimeter is hostile. With that assumption, the idea of building an impenetrable wall around that perimeter makes perfect sense. Over time, and as...
Guide
Understanding Your Attack Surface: The First Step in Risk-based Security Intelligence
As chief information security officer (CISO), it’s now a job requirement to effectively communicate with your non-technical C-suite and board of directors—preferably not just after there’s been a breach. This is the first in a series of executive white papers designed to share strategies for reducing your attack surface risk as well as how to clearly and objectively communicate your overall security posture to non-technical executives. Download this white paper and learn about: The definition of “attack surface” — and risks associated Design goals of attack surface analytics What non-technical C-suite executives and board members want
Guide
The Changing Role of the CISO
The chief information security officer, or CISO, is essential to the smooth and safe operation of any large organization.
Over the past few years, though, the scope and scale of the CISO’s task has increased markedly. No longer simply a head of IT security, the CISO is responsible for a far wider range of cyber defenses and protective measures that extend well beyond the...
Guide
Threat Prevention is Foundational
How proper foundational controls help block today’s advanced threats
Guide
Five Critical Steps of a Complete Security Risk and Compliance Lifecycle
Maintaining security and compliance in today’s ever changing environment is a never ending task. To manage that task, the most successful companies adopt a systematic approach that promotes continuous improvement.
Tripwire is a leading provider of enterprise-class foundational controls for security, compliance and IT operations. Tripwire worked with its most successful...
Guide
Tripwire State of Industrial Cybersecurity Report
As news of cyberthreats targeting industrial environments like energy utilities and manufacturing plants continues to surface, Tripwire surveyed security professionals who work in these industries to understand how industrial organizations are protecting themselves. The survey findings revealed insights on the security professionals’ levels of concern, investment in...