Security Execs’ Advice on Overcoming the Challenges of Remote Work

At the outset of the global coronavirus 2019 (COVID-19) pandemic, many organizations decided to enforce social distancing by requiring that their employees begin working from home. This decision changed the fundamental way in which many employees were … Continue reading Security Execs’ Advice on Overcoming the Challenges of Remote Work

From Customer to Employee – A Tripwire Journey

Tripwire is very much household name within the cybersecurity community. It’s been around from the early days of creating intrusion detection software that would later be known as File Integrity Monitoring (FIM) all the way through to deploying a portf… Continue reading From Customer to Employee – A Tripwire Journey

Cybercriminals Are Infiltrating Netgear Routers with Ancient Attack Methods

It would be heartening to think that cybersecurity has advanced since the 1990s, but some things never change. Vulnerabilities that some of us first saw in 1996 are still with us. If you don’t believe me, just take a look at the news. Last month, Virgi… Continue reading Cybercriminals Are Infiltrating Netgear Routers with Ancient Attack Methods

Managing Information Security Skepticism by Changing Workplace Culture

Imagine a workplace in which all of the staff support the function of information security. Employees report suspicious events, are committed to data privacy and see the value in completing the regularly scheduled compliance trainings. How much easier … Continue reading Managing Information Security Skepticism by Changing Workplace Culture

The Importance of Content for Security Tools like Tripwire

Have you ever stood in the airport security line when the agents bring the dog out to inspect everyone’s luggage? I’m always so fascinated watching the dog go down the line and do her work. Wow she’s so smart! How does she know what t… Continue reading The Importance of Content for Security Tools like Tripwire

The Center for Internet Security (CIS) Use Cases and Cost Justification

Vince Lombardi, the famous football coach, used to start his training camp each season with a talk about doing the basics. He’d tell the players that they start with the basics, then he’d take a football and hold it up and tell them, &#8220… Continue reading The Center for Internet Security (CIS) Use Cases and Cost Justification

National Cybersecurity Authority (NCA): What You Need to Know

In its Vision 2030 development plan, Saudi Arabia included a National Transformation Program whose purpose is to diversify the Kingdom’s income away from the oil industry. One of the core tenets of that program is to enable the growth of the priv… Continue reading National Cybersecurity Authority (NCA): What You Need to Know

Tripwire Research: IoT Smart Lock Vulnerability Spotlights Bigger Issues

The mechanical lock is perhaps the most fundamental, tangible, and familiar layer of security in our daily lives. People lock their doors with the expectation that these locks will keep the bad people out, but there’s a common adage in the securi… Continue reading Tripwire Research: IoT Smart Lock Vulnerability Spotlights Bigger Issues

Secure Remote Access: Why It’s Important and How to Do It Right

COVID-19 forced organizations all over the world to transition their employees to a work-from-home policy. That change came at a time when organizations’ connected infrastructure is more complex than ever. Such complexity doesn’t just exten… Continue reading Secure Remote Access: Why It’s Important and How to Do It Right