Blog
Quick Guide to Modern Security Configuration Management
                                                                          Fri, 01/31/2020
                          
                  
                  
                                            Security configuration management is the cybersecurity process of ensuring systems are properly configured to meet security and compliance standards, reducing cyber risk in the process. The practice of detecting and remediating misconfigurations combines elements of integrity monitoring, configuration validation, vulnerability assessment, and system remediation.
 
"The reliability of (Tripwire...                    
        
                            
                        Blog
US Government warns of new malware attacks on ICS/SCADA systems
                                                                                                                            
                                      By Graham Cluley on Thu, 04/14/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
Agencies of the US Government have issued a joint warning that hackers have revealed their capability to gain full system access to industrial control systems that might help enemy states sabotage critical infrastructure.
In a joint cybersecurity advisory issued by the Department of Energy, the Cybersecurity and Infrastructure Security Agency (CISA...                    
        
                            
                        Blog
Why Privacy Matters in Cybersecurity
                                                                                                                            
                                      By Former Tripwire Employee on Mon, 04/11/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
In this episode, Jarell Oshodi, Deputy Chief Privacy Officer for the Centers for Disease Control and Prevention, discusses the role of privacy in the cybersecurity field. As an attorney, she brings a unique perspective to the conversation on how we can work better with our privacy officers.
https://open.spotify.com/episode/6I9ixrw6IDnWdnHKiNU3e7...                    
        
                                Blog
Legacy systems still in use: making a cybersecurity case for modernisation
                                                                                                                            
                                      By Guest Authors on Tue, 04/05/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
What does the term “Legacy Systems” mean to you? What image does it conjure up?Well, the word “legacy” can mean “something transmitted by or received from an ancestor or predecessor or from the past.” For example, the “legacy of the ancient philosophers”, or perhaps “legacy of ancient IT professionals.” A legacy is something that is passed from one...                    
        
                                Blog
Your Guide to the NIST Cybersecurity Framework
                                                                                                                            
                                      By Guest Authors on Sun, 04/03/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
To put the impact of cybercrime into perspective, let’s examine some important, and startling, numbers:
Data breach costs increased from $3.86 million to $4.24 million in 2021.
Every 39 seconds, there is an attack.
About 90% of healthcare organizations have fallen victim to at least one breach within the past three years.
The bottom line?...                    
        
                                Blog
How Tripwire ExpertOps Can Help Solve the UK’s Cybersecurity Challenges
                                                                                                                            
                                      By Emanuel Ghebreyesus on Sun, 03/27/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
Many UK business and technology executives aren’t hopeful about their digital security going into 2022. In a survey of 3,600 business and technology executives, of which 257 were from the UK, PwC learned that a majority (61%) of respondents expected to see an increase in reportable ransomware attacks next year. An even greater proportion (64%) of UK...                    
        
                                Blog
AvosLocker ransomware - what you need to know
                                                                                                                            
                                      By Graham Cluley on Wed, 03/23/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
What is this AvosLocker thing I’ve heard about?
AvosLocker is a ransomware-as-a-service (RaaS) gang that first appeared in mid-2021. It has since become notorious for its attacks targeting critical infrastructure in the United States, including the sectors of financial services, critical manufacturing, and government facilities.
In March 2022, the...                    
        
                                Blog
EDoS: The Next Big Threat to Your Cloud
                                                                                                                            
                                      By Guest Authors on Tue, 03/22/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
What is EDoS?
Economic Denial of Sustainability (EDoS) is a cybersecurity threat targeting cloud environments. EDoS attacks exploit the elasticity of clouds, particularly auto-scaling capabilities, to inflate the billing of a cloud user until the account reaches bankruptcy or large-scale service withdrawal.
EDoS attacks exploit the cloud’s...                    
        
                                Blog
The Obsession with Faster Cybersecurity Incident Reporting
                                                                                                                            
                                      By Editorial Staff on Tue, 03/22/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
Requirements for reporting cybersecurity incidents to some regulatory or government authority are not new, but there has always been a large amount of inconsistency, globally, in exactly what the requirements are. More recently, there’s been a growing trend across government and regulatory bodies in the United States towards shorter timeframes for...                    
        
                                Blog
EPP/EDR: What Is It and How Can It Help to Keep Your Organization Safe?
                                                                                                                            
                                      By Editorial Staff on Sun, 03/20/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
Endpoint devices played a big part in malware and ransomware attacks in 2021. According to a study covered by Help Net Security, security researchers detected more malware and ransomware endpoint infections in the first nine months of the year than they did for all of 2020. Attack scripts leveraging PowerSploit, PowerWare, and other tools were...                    
        
                                Blog
Ragnar Locker ransomware - what you need to know
                                                                                                                            
                                      By Graham Cluley on Thu, 03/10/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
What is this Ragnar Locker thing I’ve heard about?
Ragnar Locker is a family of ransomware, which first came to prominence in early 2020 when it became notorious for hitting large organisations, attempting to extort large amounts of cryptocurrency from its victims.
So just your bunch of cybercriminals then?
Yes, although on their underground...                    
        
                                Blog
Building Cyber Resilience in a heightened alert environment
                                                                                                                            
                                      By Guest Authors on Wed, 03/09/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
There has been a lot of talk about cyber weapons and the cyber dimension of global politics after the NotPetya and WannaCry attacks of 2017 and the Stuxnet worm, first discovered in 2010, when it was used to attack the control mechanisms of Iran’s uranium enriching centrifuges.
Professor Ciaran Martin CB, former CEO of the UK National Cyber...                    
        
                                Blog
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of February 28, 2022
                                                                                                                            
                                      By Editorial Staff on Mon, 03/07/2022
                                                            
                  
                  
                                            
  
  
  
    
                
          
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of February 28, 2022. I’ve also included some comments on these stories.
High-Severity Flaws Discovered in Schneider, GE...                    
        
                            
                        Guide
Getting Up to Speed on GDPR
                                            Search online for the phrase “data is the new oil” and you’ll see it’s used by (and attributed to) many people. Data is a precious and highly valuable commodity. Data is the fuel pumping through today’s digital business, powering communications and commerce. Organizations the world over are mining data to turn raw information into real insight—to drive sales and grow their business. 
 
...                    
        
                            
                        Guide
Governance, Risk, and Compliance
                                            Governance, Risk & Compliance, or Generating Real Capability! How do we use GRC as a business enabler, and focus on the benefits it brings?
                    
        
                            
                         
 
 
 
 
 
 
 
 
 
 
