Blog

Blog

Improving Cyber Security Literacy in Boards & Executives

The recent Anthem hack that may have compromised 80 million people’s personal health information reveals just how mainstream data breaches have become in recent years. In response to this rapidly evolving threat landscape, Boards of Directors (BoDs) and executives are now more aware of today’s cyber threats and how they might adversely affect...
Blog

Facebook Introduces Social Sharing Platform for Cybersecurity Threats

Facebook announced on Wednesday the launch of a new platform for companies to easily exchange information regarding cybersecurity threats, such as malware and phishing attacks that could be impacting users. The world’s largest social network introduced the program, called ThreatExchange, as “an API-based clearinghouse for security threat information...
Blog

Microsoft Patches Dangerous Group Policy Vulnerability

In February’s Patch Tuesday, Microsoft issued an update to fix a privately reported critical vulnerability in Group Policy that could allow potential attackers to achieve remote code execution (RCE) in domain networks. If successfully exploited, an attacker could gain complete control of a vulnerable system, install programs, view data and even...
Blog

Drones: Security Concern or Useful Resource?

Drones have been talked about quite a bit in the news over the past couple of years—whether it’s the use of unmanned aerial vehicles (UAV) by the military or the viral video showing Amazon’s proposal for speedy drone delivery, the devices have really grabbed people’s attention. Now, many are buying their own personal drones and most are looking at...
Blog

The Voice of the CISO: Interview with Robb Reck

Last week, we interviewed Brian Engle, the Chief Information Security Officer and Cybersecurity Coordinator for the State of Texas, and discussed with him the importance of communication in shaping cybersecurity as an ongoing management concern that businesses everywhere need to appreciate. As part of our ongoing “The Voice of the CISO” series, we...
Blog

10 Notorious Cyber Criminals Brought to Justice – No. 4

Last week, we investigated the story of Vladislav Anatolievich Horohorin, a Ukrainian hacker who was well known online for managing several web forums where cyber criminals could dump and sell users’ stolen payment card credentials. Tripwire now continues its series on some of the most notorious cyber criminals brought to justice with Vladmir...
Blog

The 60/40 Security Rule

On any journey we take as we progress through life, occasions will arise when we arrive at a juncture where we recognise that somewhere way-back, we may have taken a wrong turn, which has brought us to a less than ideal place – an imposition which I believe we find ourselves in today with mitigating cyber crime and its associated threats. So, first...
Blog

Fighting Cyber Threats While Taking Human Behavior Into Consideration

In today’s corporations, information security managers have a lot on their plate. While facing major and constantly evolving cyber threats, they must comply with numerous laws and regulations, protect the company’s assets and mitigate risks as best as possible. To address this, they have to formulate policies to establish desired practices that...
Blog

Cyberterrorists Seek to Cause Physical Harm

The premise of a January 27, 2015, article by CNBC is that there is good evidence that a cyber attack against nearly any country’s critical infrastructure could be imminent. This kind of reporting has become so commonplace, but this doesn’t seem like just more FUD (fear, uncertainty, and doubt) journalism. According to Eugene Kaspersky, CEO of...
Blog

Thought Experiment: Mandatory Online Banking Security Standards

Banks are required by law to follow government regulations; these subject the banks to specific requirements, restrictions and guidelines. The end goal being, among other things, transparency. What about setting specific requirements for banking website security? Pew Research Center statistics reveal that 51% of U.S. adults bank online and 35% of...
Blog

Vulnerability Scoring 103

We’ve looked at the Tripwire IP360 Scoring System and how risk is commonly used in two different scenarios, so I figured it was worthwhile to dive into the other complex element of Tripwire’s scoring: skill. Skill is a term that, even within the IP360 Scoring System, has evolved over the years and it’s worth looking at the evolution of the word in...
Blog

Six Strategies for Reducing Vulnerability Risk

There's little doubt that effectively remediating vulnerabilities is an important part of a comprehensive information security strategy. Vulnerabilities in desktops, servers, laptops and infrastructure are commonly involved in intrusions and incidents. For example, the Chthonic malware designed to steal banking details, exploits a known Microsoft...
Blog

Vulnerability Scoring 101

On any given day, my inbox is a flurry of activity that would make a January snow squall in Canada feel like a light breeze with the occasional flake. Like a snowflake, each email is unique but many share common themes. One of these themes is my favourite discussion topic: vulnerability scoring. I was inspired to further discuss this issue after the...
Blog

NETGEAR Wireless Router Configuration Guide

This guide assumes that the reader has a NETGEAR branded wireless router and knows it’s address on the network. If you have forgotten the administrative password for your device, it may be necessary to perform a factory reset as outlined in this NETGEAR knowledge base article and then to login with the default password. Please note that while...