configuration

Identity, Credential Misconfigurations Open Worrying Security Gaps
Nathan Eddy | | Active Directory, configuration, CVE, cyentia institute, EDR, endpoints, Energy, Financial Services, manufacturing, security exposure, Vulnerabilities, XM Cyber
A report found more than 40 million exposures are impacting 11.5 million critical business entities, with more than half related to cloud platforms ...
Security Boulevard

Security policies helping or interfering?
When security policies and security testing meet… Security solutions can stop you getting things done. They can make mistakes, interpreting your actions as malicious. And then block your work. But they can ...

PCI DSS 4.0 is Here: What you Need to Consider
The Payment Card Industry Data Security Standard (PCI DSS) is a benchmark with tenure in the industry, with the first version being introduced in 2004. The PCI DSS was unique when it ...

Helping enterprises plan security
Simon PG Edwards | | 2022, Business Tips, buying decision, configuration, Cybersecurity, enterprise, Hacking, How We Test, security testing, standards, Targeted attacks
A strategic alternative to penetration testing. Is Microsoft’s anti-virus good enough? Are the ‘next-gen’ endpoint products as good as they claim? Is our combination of anti-malware and whitelisting giving us full threat ...
ASEGURE SUS CONFIGURACIONES CON EL GESTOR DE CONFIGURACIÓN DE TRIPWIRE
Como profesionales de la ciberseguridad, siempre insistimos en la importancia de la gestión de parches como una de las mejores formas de proteger los sistemas contra las vulnerabilidades. A veces, las vulnerabilidades ...
Secure Your Configurations with Tripwire’s Configuration Manager
Raymond Kirk | | configuration, Configuration Manager, Security Configuration Management, Security Controls, Tripwire Configuration Manager.
As cybersecurity professionals, we are always impressing the importance of patch management as one of the best ways to protect systems against vulnerabilities. Sometimes, the vulnerabilities are never fully exploited. Regardless of ...
CIS Control 4: Secure Configuration of Enterprise Assets and Software
Matthew Jerzewski | | assets, cis controls, configuration, enterprise, Security Configuration Management, Security Controls, software
Key Takeaways for Control 4 Most fresh installs of operating systems or applications come with pre-configured settings that are usually insecure or not properly configured with security in mind. Use the leverage ...

Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager
Determining the security posture for an increasing quantity of cloud accounts and services used by many organizations can feel overwhelming, but Tripwire Configuration Manager can help you find, fix, and even enforce ...
A Look at a Zero Trust Strategy for the Remote Workforce
Tripwire Guest Authors | | access management, configuration, remote working, Security Configuration Management, zero trust
If you are new to the security world, it is fair to ask yourself, “Isn’t access to data and systems always conditional? Isn’t it always granted to someone who has access to ...
Understanding the Cloud Security Challenges for SMBs
The events of 2020 didn’t prevent small- to mid-sized businesses (SMBs) from adopting the cloud. Impact Networking reported that SMBs’ overall cloud spending grew 6.3% between 2019 and 2020. Such growth is ...