Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

10 Ways to Keep Your Devices and Data Secure Online

Here are my top recommendations for people who want to increase the safety of their devices and data online. Please note “increase safety,” isn’t equivalent to “ensure 100% security,” because although 100% security doesn’t exist, we should still strive for it. It’s important to remember that maintaining security requires us to continually apply and update best practices to an ever-evolving digital landscape.

UpGuard Tasks: a Lightweight Tracking System for Ops

It's not pleasant to think about, but the fact is that when we go to work we are expected to do things. But what are the things that need doing? If we can answer that question without hours of meetings or dozens of emails we can finish our work and do...other things. UpGuard's new Tasks feature provides a lightweight project management system designed especially to maintain quality in a rapidly changing environment.

Infosecurity Europe Survey: Security Professionals Gearing up for Rise in Nation-State Attacks

In the midst of some of the most interesting times in geopolitical history, Tripwire wanted to see how the infosec community is currently feeling about nation-state attacks. It thus decided to conduct a survey while at Infosecurity Europe 2018 in London. Specifically, Tripwire surveyed 416 attendees to see what the future of nation-state attacks might look like.

ICS Security in a Nutshell: Common Challenges and How Tripwire Can Help Overcome Them

Industrial control systems (ICS) first proliferated at a time when cybersecurity didn’t weigh heavily on organizations’ minds. Since then, there have been two significant developments in the industry. First, cybersecurity has become a mission-critical concern for businesses everywhere. Second, there’s been a shift to new network technologies that improve data collection, efficiency and time-to-market.

Essential tips for cyber security from Innovate UK

Every year, cyber crime is costing UK businesses around £30 billion, and this figure is on the rise. So, it’s time to start taking the issue seriously. With many people still in the dark about how to go about protecting their business, we’re here to help! So to ensure your business isn’t killed off by cyber crime, here are some essential tips for cyber security.

8 Steps for a Successful DevOps Transition

Organizations stand to gain a lot from transitioning to a DevOps software development model. Switching to DevOps leads to quicker problem solving, increased employee engagement, and more time for innovation. That’s assuming a transition is successful, however. Enterprises can run into various problems along the way, including inadequately measured risk, which could spell trouble down the road. Fortunately, none of these problems are inevitable if you approach the DevOps transition methodically.

Electronics Retailer Confirms Breach Attempt of 5.9M Payment Cards

A consumer electronics retailer has confirmed a data breach attempt to compromise the details of 5.9 million payment cards. On 13 June, Dixons Carphone released a notice disclosing its investigation into an instance of unauthorized data access. The company came across the suspicious activity while reviewing its systems and data. Subsequently, it contacted security experts to help determine what happened.