security policies

Security policies helping or interfering?

When security policies and security testing meet… Security solutions can stop you getting things done. They can make mistakes, interpreting your actions as malicious. And then block your work. But they can ...
PCI DSS v4.0 Transistion Timeline

PCI DSS 4.0 is Here: What you Need to Consider

The Payment Card Industry Data Security Standard (PCI DSS) is a benchmark with tenure in the industry, with the first version being introduced in 2004. The PCI DSS was unique when it ...
Helping enterprises plan

Helping enterprises plan security

A strategic alternative to penetration testing. Is Microsoft’s anti-virus good enough? Are the ‘next-gen’ endpoint products as good as they claim? Is our combination of anti-malware and whitelisting giving us full threat ...

ASEGURE SUS CONFIGURACIONES CON EL GESTOR DE CONFIGURACIÓN DE TRIPWIRE

Como profesionales de la ciberseguridad, siempre insistimos en la importancia de la gestión de parches como una de las mejores formas de proteger los sistemas contra las vulnerabilidades. A veces, las vulnerabilidades ...

Secure Your Configurations with Tripwire’s Configuration Manager

As cybersecurity professionals, we are always impressing the importance of patch management as one of the best ways to protect systems against vulnerabilities. Sometimes, the vulnerabilities are never fully exploited. Regardless of ...

CIS Control 4: Secure Configuration of Enterprise Assets and Software

Key Takeaways for Control 4 Most fresh installs of operating systems or applications come with pre-configured settings that are usually insecure or not properly configured with security in mind. Use the leverage ...
Tripwire Configuration Manager - AWS audit

Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager

Determining the security posture for an increasing quantity of cloud accounts and services used by many organizations can feel overwhelming, but Tripwire Configuration Manager can help you find, fix, and even enforce ...

A Look at a Zero Trust Strategy for the Remote Workforce

If you are new to the security world, it is fair to ask yourself, “Isn’t access to data and systems always conditional? Isn’t it always granted to someone who has access to ...

Understanding the Cloud Security Challenges for SMBs

The events of 2020 didn’t prevent small- to mid-sized businesses (SMBs) from adopting the cloud. Impact Networking reported that SMBs’ overall cloud spending grew 6.3% between 2019 and 2020. Such growth is ...

“Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey

Cloud misconfigurations represent something that’s plaguing many organizations’ cloud adoption efforts. For example, a 2020 report found that 91% of cloud deployments contained at least one misconfiguration that left organizations exposed to ...