Software Monitoring for NERC CIP Compliance: Part 1

As organizations grappled with NERC CIP version 5, Tripwire learned along the way. In this series, I’ll cover the aspect of CIP that has come up the most in the last year: how to meet the software monitoring requirements. Software Inventory as a … Continue reading Software Monitoring for NERC CIP Compliance: Part 1

Enforce Docker Image CIS Policy Compliance with Tripwire for DevOps

We are working hard adding features to our new Tripwire for DevOps service, initially announced at BlackHat 2018. If you are a loyal State of Security follower, last you read we added Auditing for Amazon Machine Images (aka AMIs). Today, we are introdu… Continue reading Enforce Docker Image CIS Policy Compliance with Tripwire for DevOps

How DevOps and CIS Security Controls Fit Together

At this point, the Center for Internet Security’s Security Controls are an industry standard for technical cyber security. The first six basic controls can prevent 85 percent of the most common cyber attacks, and even though the controls have bee… Continue reading How DevOps and CIS Security Controls Fit Together

Two-Thirds of Organizations Don’t Use Hardening Benchmarks to Establish a Secure Baseline, Report Reveals

The Center for Internet Security’s Critical Security Controls (“the CIS Controls”) are incredibly useful in helping organizations defend themselves against digital threats. By adopting the first five controls alone, it’s possibl… Continue reading Two-Thirds of Organizations Don’t Use Hardening Benchmarks to Establish a Secure Baseline, Report Reveals

Jumpstarting Your Cyberdefense Machine with CIS Controls V7

Amidst the volatility, uncertainty and noise of the cybersecurity field, few best practice frameworks have emerged as consistently reliable and useful as the Center for Internet Security (CIS) Security Controls. Recently updated as version 7.0, the CIS… Continue reading Jumpstarting Your Cyberdefense Machine with CIS Controls V7

Election infrastructure ISAC created to share threats specific to voting systems

States and localities are getting a new, Department of Homeland Security-backed center to coordinate and share information on election security. The Elections Infrastructure Information Sharing and Analysis Center (ISAC) was announced Thursday, giving the nation’s 8,800 state and local jurisdictions a dedicated venue to share information about cyberthreats and vulnerabilities specific to election systems and remote security monitoring capabilities. DHS has tasked the nonprofit Center for Internet Security with establishing and running the ISAC. CIS already runs the Multi-State ISAC, which states have been using to coordinate on election security in lieu of any official. “The Elections Infrastructure ISAC will significantly improve communications with and among the elections community as well as enhance the cyber defense tools and capabilities available to protect elections systems,” said CIS Chairman John Gilligan in a press release. The new ISAC was announced at a panel event featuring individuals representing DHS, state-level secretaries of state and state […]

The post Election infrastructure ISAC created to share threats specific to voting systems appeared first on Cyberscoop.

Continue reading Election infrastructure ISAC created to share threats specific to voting systems

DIY Multi-Touch All the Surfaces

Ever wanted to build a touch table or other touch-input project, but got stuck figuring out the ‘touch’ part? [Jean Perardel] has your back with his multi-touch frame over on IO that makes any surface touch-reactive. In [Jean]’s case, that surface is ultimately a TV inside of a table.

Of course, it’s a bit of a misnomer to say the surface itself becomes touch-reactive. What’s really happening here is that [Jean] is using light triangulation to detect shadows and determine the coordinates of the shadow-casting object. Many barcode scanners and consumer-level document scanners use a contact image sensor (CIS) to …read more

Continue reading DIY Multi-Touch All the Surfaces

Foundational Controls for Common Attack Types

In January 2017, Tripwire completed a survey of 403 IT Security professionals about the most common attack types and how prepared organizations are to defend against them. You can read about the details here. There are two important conclusions from the research that I have to share for the purposes of this post. First, the […]… Read More

The post Foundational Controls for Common Attack Types appeared first on The State of Security.

Continue reading Foundational Controls for Common Attack Types