Cloud Security a Shared Responsibility – Shared Security Model

Cloud Security a Shared Responsibility – Shared Security Model

The post Cloud Security a Shared Responsibility – Shared Security Model appeared first on CCSI ...

Letting Go While Holding On: Managing Cyber Risk in Cloud Environments

As recently as 2017, security and compliance professionals at many of Tripwire’s large enterprise and government customers were talking about migration to the cloud as a possibility to be considered and cautiously ...
Feature Release: 18.7 – CIS Kubernetes Compliance Pack, Customized Harvesting, & More

Feature Release: 18.7 – CIS Kubernetes Compliance Pack, Customized Harvesting, & More

The post Feature Release: 18.7 – CIS Kubernetes Compliance Pack, Customized Harvesting, & More appeared first on DivvyCloud ...
Securing Your Microsoft Azure Environment

Securing Your Microsoft Azure Environment

The post Securing Your Microsoft Azure Environment appeared first on DivvyCloud ...

Achieve Security Through Compliance in the Cloud

| | CIS, Cloud, Compliance
Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy ...
cloud

Achieve CIS Compliance in Cloud, Container and DevOps Environments

| | CIS, Cloud, Complaince, containers, DEVOPS, policy
If you are embracing DevOps, cloud and containers, you may be at risk if you’re not keeping your security methodologies up to date with these new technologies. New security techniques are required ...

Software Monitoring for NERC CIP Compliance: Part 1

As organizations grappled with NERC CIP version 5, Tripwire learned along the way. In this series, I’ll cover the aspect of CIP that has come up the most in the last year: ...
Enforce Docker image CIS policy compliance with Tripwire For DevOps

Enforce Docker Image CIS Policy Compliance with Tripwire for DevOps

We are working hard adding features to our new Tripwire for DevOps service, initially announced at BlackHat 2018. If you are a loyal State of Security follower, last you read we added ...

How DevOps and CIS Security Controls Fit Together

At this point, the Center for Internet Security’s Security Controls are an industry standard for technical cyber security. The first six basic controls can prevent 85 percent of the most common cyber ...

Two-Thirds of Organizations Don’t Use Hardening Benchmarks to Establish a Secure Baseline, Report Reveals

The Center for Internet Security’s Critical Security Controls (“the CIS Controls”) are incredibly useful in helping organizations defend themselves against digital threats. By adopting the first five controls alone, it’s possible for ...
Loading...