Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Do I need to Fear My Toaster?

My mobile phone tells me my doorbell is ringing. Sweet. Of course I can hear the doorbell, but that’s not the point is it? Do I need my microwave oven to tell me by text something is cooked? No. Not sure if I can trust it that far, and of course I need to put the food in to start with so I know it won’t take long. I’m also hungry and eager to eat so I’m not going to wander off – certainly not to the shops for half and hour.

Staying Secure When Online Shopping: Getting the Basics Right

Online shopping has become so popular that it has contributed to the fall of once giant businesses like Sears. But beneath the convenience of ordering goods at home is a mammoth cybersecurity problem that affects millions of users every year. You may think shopping on sites like Amazon and eBay is completely safe – but it’s not. Hackers can get your credit card information if your passwords are weak. Attackers can send malware to your PC as you shop.

Tripwire Visibility for ICS: Getting From Data Mountains to Event Nuggets

If you operate an industrial network, you know that it is important to recognize operational errors and malicious changes as fast as possible to prevent unsafe and costly conditions from emerging. But achieving this goal requires you to be able to ingest enormous volumes of data and reduce this to an actionable volume of events that indicate the presence of a problem. You don’t have days to get this done. You need an answer in a matter of minutes.

Enforce Docker Image CIS Policy Compliance with Tripwire for DevOps

We are working hard adding features to our new Tripwire for DevOps service, initially announced at BlackHat 2018. If you are a loyal State of Security follower, last you read we added Auditing for Amazon Machine Images (aka AMIs). Today, we are introducing CIS policy compliance auditing for Docker images. Tripwire for DevOps allows you to evaluate your Docker Images to check for policy compliance at build time.

How to Defend Your IoT Devices from IoT Botnets

The Internet of Things (IoT) is changing how the world works. Machine to machine (M2M) communication simply makes for faster, more timely, and transparent connections, thereby saving us a lot of time and money. In the hands of the right people, the IoT has great potential to improve quality of life. But some people have found a way to exploit the IoT for their own gain. They do this through the IoT botnet.

Security Orchestration, Automation, And Response (SOAR) Overview

As per Gartner definition, SOAR is the set of technologies that allow enterprises to collect security threats’ alerts and data from multiple sources, and then perform incident analysis and remediation process by using both human skills and machine power together to help in defining, prioritizing, and driving standardized incident response activities in accordance with a standard workflow.

Balancing Data Security and Accessibility

Keeping pace with change. Out with the old, in with the disruptive. Digital disruption has changed every aspect of business and now more than ever, people are paying close attention to the way businesses approach data security. During the 2018 Egnyte Customer Summit, industry leaders presented compelling insight into how the data landscape is evolving and how businesses are being forced to adapt.

Bots: how worried should we be?

Prove you are a human. If you think about that sentence for too long, you realise it’s actually incredibly complex and can bring about a sense of existential angst. Yet, it’s something that is demanded of us on a near daily basis, sometimes more. It turns out, proving our humanity doesn’t require showing the capacity to love, or even passing Blade Runner’s Voight-Kampff test. Rather, we just need to be able to click on pictures of cars or shop fronts.

Apache Struts Vulnerabilities vs Spring Vulnerabilities

Developers the world over depend on the Apache Struts open source framework to build valuable and powerful applications. This open source component and the Apache Software Foundation that stands behind it have provided organizations with a cost-effective force multiplier that allows their teams to develop faster and more efficiently. A very active project, GitHub shows Apache Struts as having 5,441 commits and 112 releases.