Security Controls
How to Enhance Security Without Affecting the Customer Experience
Navigating the landscape of customer interactions is a delicate balancing act that requires constant calibration between security and operability (or usability, if speaking from a customer’s perspective) ...
Security Boulevard
Closing the False Positives Gap for SOC Efficiency
Eliminating false positives can remarkably enhance security operations center (SOC) efficiency and cost-effectiveness ...
Security Boulevard
Zero-Trust Alone Won’t Save You
Teri Robinson | | API security, AppSec, Security Controls, zero trust, Zero-Trust Network Architecture (ZTNA)
With all the chatter surrounding zero-trust, it seems mature initiatives should be chugging along by now. But Gartner just threw a bucket of reality on the market with its prediction that in ...
Security Boulevard
Complying with the Egypt Financial Cybersecurity Framework: What you Should Know
Which cybersecurity framework is the best one to use for an organization? This is one of the most frequently asked questions when embarking on the cybersecurity journey. Often, the answer falls quite ...
Foundational Activities for Secure Software Development
Tripwire Guest Authors | | Featured Articles, Policies and Procedures, secure software, Security Controls, software, Software Development
Follies The Broadway Tower in Worcestershire, England is a famous structure. It’s inspiring, beautiful, and at 62 feet high, like other similar buildings, it’s a folly. While it looks grand inside and ...
Neither Pointless Nor Boring: Pop It and Lock It Down with CIS Controls
I’m delighted to share that I will be speaking for the first time at SecTor this year. The talk will be in Theatre 1 at 1:15pm on October 5th. In the session ...
Major Database Security Threats & How You Can Prevent Them
Tripwire Guest Authors | | Attack, database, Featured Articles, Permissions, Security Controls, Security threats, threats, Vulnerabilities, Vulnerability Management
Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...
Strong Authentication Considerations for Digital, Cloud-First Businesses
Tripwire Guest Authors | | Authentication, Featured Articles, MFA, Multi-Factor Authentication, Security Controls
Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets. The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is ...
How Penetration Testing can help prevent Ransomware Attacks
Tripwire Guest Authors | | Featured Articles, Penetration Testing, pentest, Ransomware, Security Controls, security policy
It is hard to believe, but ransomware is more than three decades old. While many would think that the ransomware mayhem started with the WannaCry attack of 2017, that is simply the ...
Supply Chain Cybersecurity – the importance of everyone
Tripwire Guest Authors | | Cybersecurity, Data Security, Featured Articles, Security Controls, suppliers, supply chain, Vulnerabilities
This week, I spoke with a new client who told me all about how they are looking forward to addressing a number of internal issues surrounding their IT systems. They explained that ...