The State of Security
The State of Security is an award-winning blog featuring the latest news, trends and insights on current information security issues, including risk, compliance, incident detection and vulnerability research. Apart from our own frequent contributors, we w
VERT Threat Alert: October 2022 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s October 2022 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1025 on Wednesday, October 12th. In-The-Wild & Disclosed CVEs CVE-2022-41033 ...
Turning a Pico into a Human Interface Device (HID)
Tyler Reguly | | Featured Articles, IoT Hack Lab, IT Security and Data Protection, Raspberry Pi, SecTor, VERT Hack Lab
I just walked out of room 716 at SecTor here in Toronto, where I shared details on my Raspberry Pi Pico project. I’m happy that I was finally able to share this and ...
The State of Security: Poland
Anastasios Arampatzis | | Cyber Security, cyberattack, Malware, Privacy, State of Security, surveillance
Poland is getting ready for the upcoming Presidential elections in August 2023 amidst a turbulent geopolitical and economic environment. The war in Ukraine has placed the country in the epicenter of the ...
4 tips to achieve Data Compliance
Tripwire Guest Authors | | Compliance, Data management, Data Privacy, Data Security, Featured Articles, framework, IT Security and Data Protection
Data compliance is a crucial and essential factor in organizations that should be carefully followed for data management. Data compliance is more than maintaining relevant standards and regulations and ensuring that the ...
Complying with the Egypt Financial Cybersecurity Framework: What you Should Know
Which cybersecurity framework is the best one to use for an organization? This is one of the most frequently asked questions when embarking on the cybersecurity journey. Often, the answer falls quite ...
What to Know about APIs, the “On-Ramps to the Digital World”
An application programming interface, or API, is a defined process that allows data to be shared between applications or programs. Each API consists of a set of rules that dictates how communication ...
CISA orders federal agencies to catalog their networks, and scan for bugs
Graham Cluley | | asset discovery, asset management, cisa, Compliance, Featured Articles, Federal Government, government
You always want to know what is attached to your network. And whether it could be vulnerable or not. In any organisation it’s normal for different devices, on- or off-prem, wired or ...
See Yourself in Cyber: 4 Steps to Stay Safe
Anastasios Arampatzis | | cybersecurity awareness, Featured Articles, national cyber security awareness month, password manager, Phishing, Security Awareness, updates
As threats to technology and private information become more frequent, the President of the United States and Congress have proclaimed October to be Cybersecurity Awareness Month. This initiative aims to assist people ...
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022
Andrew Swoboda | | Featured Articles, Intel, Microsoft, sophos, VERT News, Windows, Windows 11, zero-day, Zero-day Vulnerability
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us ...
UK Construction: Cybersecurity Experts Defend Joint Ventures
Tripwire Guest Authors | | best practice, data, Featured Articles, Industry, Information Security, IT Security and Data Protection, management
After years of falling behind, the construction industry has realised the importance of its data. Construction-related businesses invested a remarkable 188% more in cybersecurity in 2018–19. Data leaks and cyberattacks have jolted ...