Rise of DevOps exposes organizations to risk via container vulnerabilities

60 percent of respondents to a Tripwire and Dimensional Research study reported their organizations have experienced container security incidents in the past year. Yet, of the 269 respondents who currently have containers in production, 47 percent said… Continue reading Rise of DevOps exposes organizations to risk via container vulnerabilities

Latest Version of Tripwire IP360 Now Certified To Meet Most Current Common Criteria Certification Standards

Tripwire has demonstrated its ongoing commitment to meeting U.S. government and internationally recognized security standards by achieving the most current Common Criteria standards for its latest version of Tripwire IP360’s 9.0.1, specifying the… Continue reading Latest Version of Tripwire IP360 Now Certified To Meet Most Current Common Criteria Certification Standards

Tripwire Products: Quick Reference Guide

Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today, we’d like to offer a straight-forward roundup of the Tripwire product suite. … Continue reading Tripwire Products: Quick Reference Guide

Tripwire Enterprise now collects digital forensic data to support incident response

Tripwire Enterprise now features the ability to collect digital forensic data in the event of a data breach. “Tripwire Enterprise monitors systems in real-time for changes that could be indicative of a breach,” said Tim Erlin, vice presiden… Continue reading Tripwire Enterprise now collects digital forensic data to support incident response

How UK Public Sector Organizations Can Craft an Effective Cyber Security Strategy

Organizations in the United Kingdom’s public sector face several challenges in terms of their digital security. Today, these companies must meet an increasing number of regulatory compliance obligations. GDPR likely sits near the top of UK public… Continue reading How UK Public Sector Organizations Can Craft an Effective Cyber Security Strategy

Who’s In Your Online Shopping Cart?

Crooks who hack online merchants to steal payment card data are constantly coming up with crafty ways to hide their malicious code on Web sites. In Internet ages past, this often meant obfuscating it as giant blobs of gibberish text that is obvious even to the untrained eye. These days, a compromised e-commerce site is more likely to be seeded with a tiny snippet of code that invokes a hostile domain which appears harmless or that is virtually indistinguishable from the hacked site’s own domain. Continue reading Who’s In Your Online Shopping Cart?

Tripwire IP360 re-certified to meet Common Criteria certification standards

Tripwire’s latest version of its vulnerability management solution, Tripwire IP360, v9.0.1, has achieved Common Criteria Evaluation Assurance Level 2 augmented with Flaw Remediation (EAL2+). Internationally recognized as the evaluation standard f… Continue reading Tripwire IP360 re-certified to meet Common Criteria certification standards