shark

Shark Week: Avoid Being Cyber Bait in Uncharted Waters

Keeping employees protected during WFH is a lot like keeping swimmers protected from shark attacks As the world navigates the unchartered waters of a global pandemic, organizations must re-evaluate their security strategies ...
Security Boulevard

DevOps Speed and Security Can Co-Exist | Keyfactor

No one is denying the need for high levels of security in today’s enterprise. Security has been a top priority for a long time and will continue to remain one for the ...

How InfoSec & DevOps Can Stop Certificate Outages | Keyfactor

For all the gaps that exist between DevOps and security teams as enterprises try to balance speed of development and security simultaneously, there’s one thing that can bring these two teams together: ...

National Poetry Month – Cybersecurity Edition

April is National Poetry Month, a time when we can celebrate poets and their craft. To join in the celebrations, we at the State of Security asked employees at Tripwire and in ...
The Tripwire Cybersecurity Podcast

Podcast Episode 4: Understanding the Impact of the Skills Gap on the Infosec Market

| | Infosec, Podcast, skills gap
Listen and subscribe to our new podcast! Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim ...

How Organizations Can Fight to Retain Talent Amidst the Infosec Skills Gap

In a previous post, I shared some expert insight into how organizations can address the challenges of hiring skilled talent despite the ongoing infosec skills gap. Organizations can’t rest easy once they’ve ...

Mental Health for Hackers: Contents Under Pressure

In 2011, I was in the middle of sitting down when I suddenly felt prickling sensations start from my toes, spread up my legs, and make their way into my arms. I ...
Evolving Threat series — Mining patterns to assess Insider Attacks (Part 3)

Evolving Threat series — Mining patterns to assess Insider Attacks (Part 3)

Evolving Threat series — Mining patterns to assess Insider Attacks (Part 3)In the previous post we examined few of the published insider attacks over the current decade. In this post we attempt to mine, ...
Evolving Threat series — Insider Attacks case studies (Part 2)

Evolving Threat series — Insider Attacks case studies (Part 2)

Evolving Threat series — Insider Attacks case studies (Part 2)In the last post we touched on formal definition and risks associated with Insider Threats.In this post we will examine the top X insider threats ...
Evolving Threat series— Understanding Insider Attacks (Part 1)

Evolving Threat series— Understanding Insider Attacks (Part 1)

Majority of security solutions focus on externally triggered unauthorized and illegitimate access to systems and information. Unfortunately, the most damaging malicious activity is the result of internal misuse within an organization, perhaps ...