Security Controls
What Is GitOps and How Will it Impact Digital Forensics?
Tripwire Guest Authors | | Development, DEVOPS, DFIR, Digital Forensics, Incident Response, Security Controls
GitOps is arguably the hottest trend in software development today. It is a new work model that is widely adopted due to its simplicity and the strong benefits it provides for development ...
Center for Internet Security (CIS) Controls v8: Your Complete Guide to the Top 18
The Center for Internet Security (CIS) controls are a relatively short list of high-priority, highly effective defensive actions that provide a “must-do, do-first” starting point for every enterprise seeking to improve its ...
Inter-Chip Communication: Design Considerations to Mitigate Commonly Overlooked Attack Paths
emmaline | | design considerations, inter-chip, Internet of things, IoT Security, mitigation, Security Controls, Threat Modeing, trust boundary
Introduction At Praetorian, we perform security assessments on a variety of Internet of Things (IoT) devices ranging from commodity home “smart” devices, medical devices, critical infrastructure, and autonomous vehicles. While previous blog ...
What Is ISO/IEC 27017?
Joe Pettit | | Cloud, cloud services, Compliance, csp, Featured Articles, Guidelines, ISO/IEC 27017, Security Controls
More than a third of organizations suffered a serious cloud security incident in 2021. According to a survey of 300 cloud professionals covered by BetaNews, 36% of those respondents said that their ...
CIS Control 18 Penetration Testing
Penetration testing is something that more companies and organizations should be considering a necessary expense. I say this because over the years the cost of data breaches and other forms of malicious ...
CIS Control 17: Incident Response Management
Tyler Reguly | | cis controls, incident management, Incident Response, Incident Response and Mangement, Security Controls
We all know that it is a question of when you will be compromised and not if you will be compromised. It is unavoidable. The goal of CIS Control 17 is to ...
The Cyber Assessment Framework: Guided Cyber Resilience
Bob Covello | | Cyber Assessment Framework, cyber resilience, Featured Articles, Resilience, Security Controls
Remember how, just a few years ago, many organizations were striving to be cyber secure? Over the last years, it seemed that crowing about one’s cybersecurity posture became the very thing that mocked ...
CIS Control 16 Application Software Security
The way in which we interact with applications has changed dramatically over years. Enterprises use applications in day-to-day operations to manage their most sensitive data and control access to system resources. Instead ...
Your Guide to the NIST Cybersecurity Framework
Tripwire Guest Authors | | NIST, NIST Cybersecurity Framework, nist framework, Security Controls, tools
To put the impact of cybercrime into perspective, let’s examine some important, and startling, numbers: Data breach costs increased from $3.86 million to $4.24 million in 2021. Every 39 seconds, there is ...
ASEGURE SUS CONFIGURACIONES CON EL GESTOR DE CONFIGURACIÓN DE TRIPWIRE
Como profesionales de la ciberseguridad, siempre insistimos en la importancia de la gestión de parches como una de las mejores formas de proteger los sistemas contra las vulnerabilidades. A veces, las vulnerabilidades ...