Back in 2015, we published an article about the third party risks that are introduced into a home network. Now, eight years later, it is a good time to revisit the landscape of the home network. If we think about…
Tag: Blog RSS Feed
Security Awareness Training (SAT) is finally having its day. Here’s why.
Cybersecurity awareness is on the rise as more organizations adopt security awareness training programs. Why the hype? In several recent reports, we break down our findings around why SAT is on the rise—and why companies need it now more than…
Understanding how Polymorphic and Metamorphic malware evades detection to infect systems
Polymorphic and metamorphic malware constantly changes itself in order to avoid detection and persistently remain on the system. This adaptive behavior is the main distinctive attribute of these types of malware, which is also why they are harder to detect;…
A Bright Future for Forensic Analysis
I’m going to jump on board the Artificial Intelligence/Machine Learning (AI/ML) bandwagon in this blog and talk about why I’m excited about some of the prospects for this being applied to the compliance and file integrity monitoring data that Tripwire…
#TripwireBookClub – How to Hack Like a Legend
This one took a bit longer to read than most of the books we review, but that’s entirely on me… everyone else finished it a while ago. This time around, we’re looking at How to Hack Like a Legend: Breaking…
Do you Work in a SOC Noise Factory?
Gabrielle is a security engineer. She deploys tools to scan for threats and vulnerabilities, read logs, and manage the security risks for her company, but is all that data really helping? Sometimes, it seems like she works in a noise…
How ChatGPT is Changing Our World
The Artificial intelligence (AI) based language model, ChatGPT, has gained a lot of attention recently, and rightfully so. It is arguably the most widely popular technical innovation since the introduction of the now ubiquitous smart speakers in our homes that…
VERT Reads All About It – Cybersecurity News May 22, 2023
The Tripwire Vulnerability Exposure and Research Team (VERT) keeps its finger on the cybersecurity pulse. Check out some of the stories that stood out for us recently: Multiple Vulnerabilities in Netgear Routers Netgear RAX30 routers are subject to multiple vulnerabilities.…
Take action now to avoid BianLian ransomware attacks, US Government warns organisations
The US Cybersecurity and Infrastructure Security Agency (CISA), FBI, and others have issued a joint alert, advising organisations of the steps they should take to mitigate the threat posed by BianLian ransomware attacks. BianLian, which has been targeting different industry…
Risk Tolerance: Understanding the Risks to your Organization
‘A ship in port is safe, but that’s not what ships are built for,’ said Dr. Grace Hopper, Rear Admiral of the US Navy and a computer pioneer. As soon as the ship leaves the harbor, or even the dock,…
Security Journeys: From Change Management to Compliance
Zero Trust seems to no longer command the volume of articles that once set it up as a trend that promised a bright new future for security. This is in part because security is a journey. Rushed implementations and low…
Common Social Media Scams and How to Avoid Them
While there are an estimated 30,000 daily cyber attacks on business websites, there are roughly ten times as many attacks against social media accounts every single day, equating to roughly 1.4 billion accounts every month. Social media attacks and scams…
Q1 2023 Privacy: In for Another Wild Year
2023 started much the same as the year before, with state legislatures producing an impressive list of privacy-related bills in the U.S. Twenty-three states introduced comprehensive privacy legislation, with many more targeted privacy bills being considered as well. Iowa’s governor…
How to comply with PCI DSS 4.0 while juggling day-to-day tasks
In our webinar, Insights for Navigating PCI DSS 4.0 Milestones, we discuss some of the challenges organizations face as they try to comprehend the new requirements of PCI DSS 4.0. One of the questions we commonly hear is, “How do…
Tripwire Products: Quick Reference Guide
Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today we’d like to offer a straight-forward roundup of Fortra’s Tripwire product suite. Get to…
Beyond the firewall: How social engineers use psychology to compromise organizational cybersecurity
A Social engineering attack is the process of exploiting weaknesses in human psychology to manipulate and persuade others to perform in a way that is harmful. Prior to the digital age, criminals would carry out these attacks in person, in…
Akira ransomware – what you need to know
What is Akira? Akira is a new family of ransomware, first used in cybercrime attacks in March 2023. Akira? Haven’t we heard of that before? Maybe you’re thinking of the cyberpunk Manga comic books and movie that came out in…
Red Teaming: 4 Ways to Get the Best Value While Improving Your Security
What is Red Teaming? Red Teaming will always have similar concepts and strategies, but no Red Team endeavour is the same, and the meaning may change from one organization to another. Simply stated, Red Teaming is acting as an adversary…
3 Tips for Enterprise Patch Management
We have recently concluded the first quarter of 2023, and there have already been over 250 patches for the many components and flavours of Microsoft’s operating systems, as well as a handful of patches for Adobe, Apple, and Android. If…
Professional Services in the World of Cybersecurity
Cybersecurity is a critical concern for businesses of all sizes and industries. With the increasing sophistication of cyber threats, it’s more important than ever to have a robust security strategy in place. However, many organizations lack the expertise or resources…