Integrity: The New “I” in PCI Compliance

The retail industry saw more than its fair share of data breaches in 2017, with security incidents detected at American supermarket chain Whole Foods Market and clothing companies Brooks Brothers, The Buckle, and Forever 21, to name a few. At least som… Continue reading Integrity: The New “I” in PCI Compliance

Why ‘Yes Persons’ Make Change Control a Necessity for Your Company

Recently, my nine-year-old son informed me that he had observed over time how I always seem to help other people and how others always depend on me. I said to him that, in a way, he is much the same, as he is always saying ‘yes’ to doing li… Continue reading Why ‘Yes Persons’ Make Change Control a Necessity for Your Company

Why ‘Yes Persons’ Make Change Control a Necessity for Your Company

Recently, my nine-year-old son informed me that he had observed over time how I always seem to help other people and how others always depend on me. I said to him that, in a way, he is much the same, as he is always saying ‘yes’ to doing li… Continue reading Why ‘Yes Persons’ Make Change Control a Necessity for Your Company

Back to Basics: Tips to Improve Your Security Hygiene

Recently, I had the pleasure of working with Amrit Chana, a 15-year-old girl from Newlands Girl School in Maidenhead, UK who completed a week’s worth of work experience at Tripwire. Amrit helped with the content of this article, providing input on the areas we believe need to be addressed by every user of a computer […]… Read More

The post Back to Basics: Tips to Improve Your Security Hygiene appeared first on The State of Security.

Continue reading Back to Basics: Tips to Improve Your Security Hygiene

How To Protect Yourself Against Petya Ransomware

The latest attack the world has seen recently is a variant of the Petya ransomware virus. As of this writing, it appears a new variant of Petya has been released with EternalBlue exploit code built in, which WannaCry utilised to propagate around organisations. Unlike WannaCry, Petya is a different kind of ransomware. Common delivery methods […]… Read More

The post How To Protect Yourself Against Petya Ransomware appeared first on The State of Security.

Continue reading How To Protect Yourself Against Petya Ransomware

Posted in SBN

Ransomware Attack – Am I Safe Against “Wana Decrypt0r”?

On Friday May 12th, the headlines were all about the NHS UK trusts have been impacted by a severe cyber-attack. The nature of the attack is related to a strain of ransomware called “Wana Decrypt0r 2.0”. As the news unfolded, reports revealed the NHS was not the only organization to have been victims of the […]… Read More

The post Ransomware Attack – Am I Safe Against “Wana Decrypt0r”? appeared first on The State of Security.

Continue reading Ransomware Attack – Am I Safe Against “Wana Decrypt0r”?

Is Security Ready for the Next 20 Years of Technology?

It doesn’t seem that long ago that we didn’t have online access to many of our utility, banking, and/or even shopping accounts. I was fortunate enough to be part of a revolutionary project at a university in southern England back in 1988, where accessing the internet was using a 1200 baud modem, a terminal emulator […]… Read More

The post Is Security Ready for the Next 20 Years of Technology? appeared first on The State of Security.

Continue reading Is Security Ready for the Next 20 Years of Technology?

Fifty Shades of FIM

File Integrity Monitoring solutions have been around for a few decades now, with one purpose in mind: to monitor changes to files on the endpoint. However, there is more to integrity monitoring than just looking at files. Over the past year or so, whilst working with Tripwire, I have met a large number of people […]… Read More

The post Fifty Shades of FIM appeared first on The State of Security.

Continue reading Fifty Shades of FIM

Breaking Out of the Checkbox with PCI 3.2 Compliance

Since 2004, merchant companies that handle branded credit cards have worked to maintain compliance with the Payment Card Industry Data Security Standards (PCI DSS). These regulations, which consist of six fundamental control objectives and 12 core requirements, aim to protect payment card data for customers. They also help card issuers and banks limit their liability […]… Read More

The post Breaking Out of the Checkbox with PCI 3.2 Compliance appeared first on The State of Security.

Continue reading Breaking Out of the Checkbox with PCI 3.2 Compliance

The “Why’s” and “How’s” of an Incident Management Call

Recently, I had a meeting with a potential customer who was looking to invest in Tripwire’s portfolio. We got to talking about various aspects of information security–in particular, when companies react and investigate potential security breaches. The conversation took me back to when I worked in information security as a technical security manager. When the […]… Read More

The post The “Why’s” and “How’s” of an Incident Management Call appeared first on The State of Security.

Continue reading The “Why’s” and “How’s” of an Incident Management Call