On April 7, a dramatic OpenSSL vulnerability called Heartbleed rocked the Internet. It’s estimated that over 66% of active websites on the internet are exposed to the bug and users everywhere are scrambling to patch the hole.
Just how bad is Heartbleed?
Listen to episode 136 of our Security Slice podcast and hear Tim Erlin, Ken Westin, Craig Young and Tyler Reguly discuss how Heartbleed actually works, why Heartbleed fear may be a bit overblown, and the steps enterprises and consumers should take to protect themselves.
Click Here to Listen to the Podcast
And be sure to join us for the webcast Heartbleed Outpatient Care: Steps for Secure Recovery on Thursday, April 17, 2014 1:00 PM EDT/10:00 AM PDT where we will be discussing the need for a robust security strategy for rapid reaction to vulnerabilities and threats.
In this webcast we will examine:
- The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
- How you can identify your business exposure and what systems are vulnerable
- How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
- Security Slice: DDoS Dangers and Scam Phone Calls
- Security Slice: Pwnable Power Plants
- Security Slice: Minimizing Mobile Malware
- Security Slice: Firefox Browser Fails
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock