PCI DSS 3.2 Prioritized Checklist
Many businesses that conduct transactions with credit or debit cards in person, online or by phone found they were behind in their preparations and compliance audits based on the latest Payment Card Industry’s Data Security Standard revision 3.2 (PCI DSS 3.2). Though the requirements have been in place since 2018, organizations should ensure continuous compliance to achieve a solid security...
Tripwire’s Response to CVE-2021-44228 Apache Log4j2
On December 9th 2021, Apache published a zero-day vulnerability (CVE-2021-44228) for Apache Log4j2 being referred to as “Log4Shell.” This vulnerability has been classified as “Critical” with a CVSS score of 10, allowing for Remote Code Execution with system-level privileges.
Tripwire has investigated all currently supported versions of the following software regarding the Log4j2 vulnerability:
...
Product Video
Tripwire ServiceNow Demo
Mon, 08/15/2022
The integration between Tripwire Enterprise and ServiceNow creates a workflow for the smooth exchange of system change and security configuration state information with a wide variety of compliance, operations, and reporting/analytics solutions. This combination enables organizations to validate authorized change and immediately determine the efficacy of the change management process.
To...
Product Video
Tripwire and Check Point for Unprecedented Protection Against Zero-Day Threats
Mon, 08/15/2022
Tripwire Enterprise for Check Point ThreatCloud Emulation Service delivers advanced and zero day malware detection with threat intelligence to help reduce the time to accurately detect and protect your entire enterprise against advanced threats.
Blog
The State of Cybersecurity has improved but is hardly flawless
By Guest Authors on Sun, 09/25/2022
For the record, it should be acknowledged from the start that there is no question that the cybersecurity landscape has improved over time, mostly courtesy of persistent increases in cyber spending year after year. Gartner estimates that the U.S. and the rest of the world will invest $172 billion in cybersecurity this year, up from $150 billion last...
Blog
What Are Privacy-Enhancing Technologies (PETs)? A Comprehensive Guide
By Guest Authors on Tue, 09/20/2022
Modern enterprises will have to work with customer data in one way or another. The COVID-19 pandemic proved that the only businesses that would survive the future were those willing to embrace technology. While technologies such as the Internet of Things, and artificial intelligence have undeniable benefits, they have also presented complications.
...
Blog
SecTor 2022: The Power of the Pico
By Tyler Reguly on Mon, 09/19/2022
I’m excited to share that I will be speaking at SecTor this year in the tools track. While the SecTor schedule is not yet finalized, I’m currently listed as speaking at 10:15am on October 6th. The talk, The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico, will cover how to use a Raspberry Pi Pico to perform BadUSB attacks....
Blog
A Traveller’s Guide to Staying Cyber safe
By Guest Authors on Mon, 09/19/2022
With the massive increase in mobile device sales worldwide, it is easy to imagine that the number of people using the internet while travelling has also increased significantly in recent years. With this growth in online activity comes a greater risk of becoming a victim of cybercrime. There are a number of steps that travellers can take to protect...
Blog
Strong Authentication Considerations for Digital, Cloud-First Businesses
By Guest Authors on Wed, 09/14/2022
Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets. The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is the process of verifying that a user’s identity is genuine.
In this climate of advanced cyber threats and motivated...
Blog
Cybersecurity Threats to the US Water Industry
By Guest Authors on Tue, 09/13/2022
In an increasingly digital world, cybersecurity is a significant - and relevant - threat to individuals and companies alike. Cybercriminals are constantly devising new ways to steal information for personal gain through exploitation or ransom demands.
It’s become unfortunately commonplace to hear tales of drained checking accounts, leaked photos,...
Blog
How to Correctly Classify Your Data in 2022
By Guest Authors on Sun, 09/11/2022
Data classification can feel like an overwhelming task, especially for organizations without a strong practice in place. As with any security approach, data classification is both crucial and tempting to avoid. Regardless of whether the value is recognized, there’s a chance that it gets pushed further and further down the priority list in favor of...
Blog
How Penetration Testing can help prevent Ransomware Attacks
By Guest Authors on Wed, 09/07/2022
It is hard to believe, but ransomware is more than three decades old. While many would think that the ransomware mayhem started with the WannaCry attack of 2017, that is simply the most publicized example. Since then, dozens of ransomware strains have been utilized in a variety of cyberattacks.
According to a PhishLabs report, by Fortra,...
Blog
Working Abroad as a Cybersecurity Professional: What You Need to Know
By Guest Authors on Wed, 09/07/2022
The world is becoming a smaller place. The prospect of working in another country becomes increasingly realistic and even promising as businesses migrate toward the cloud and collaborate more closely with international partners. Amid this shift, cybersecurity professionals may wonder if they can work abroad.
Cybersecurity is a worldwide concern,...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 29, 2022
By Andrew Swoboda on Mon, 09/05/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 29th, 2022. I’ve also included some comments on these stories.
WordPress 6.0.2 Patches Vulnerability That Could...
Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 22, 2022
By Andrew Swoboda on Mon, 08/29/2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 22nd, 2022, including some commentary of mine.
VMware fixed a privilege escalation issue in VMware Tools
VMware...