[eBook] Building A Cyber-Secure Culture
Tripwire, Inc.
Remotely controlled EV home chargers – the threats and vulnerabilities
We are now seeing signs of a possible shift in the field of personal transport. Recent events such as the ‘dieselgate’ scandal undermine customer...
Read: New Attack Analytics Dashboard Streamlines Security Investigations
Attack Analytics, launched this May, aimed to crush the maddening pace of alerts that security teams were receiving. For security analysts unable to triage...
Zero Trust Lessons from a Holiday Classic
Every year when the holidays roll around, I’m amazed at the way shopping deals dominate the headlines. Black Friday and Cyber Monday are annual...
Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)
Executive summary
In October 2018, our AEP (Automatic Exploit Prevention) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further...
PCI DSS and the CIS Controls
PCI DSS and the CIS Controls #outlook a{ padding:0; } body{ width:100%...
Gartner Names Centrify a Leader in Magic Quadrant for Privileged Access Management (PAM)
On December 3, 2018 Gartner released The Magic Quadrant for Privileged Access Management, Q4 2018. Evaluating 14 vendors, Gartner positioned Centrify in the LEADERS...
DarkVishnya: Banks attacked through direct connection to local network
While novice attackers, imitating the protagonists of the U.S. drama Mr. Robot, leave USB flash drives lying around parking lots in the hope that...
APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them?
Not an easy question...
Maximize ICS Availability with Tripwire Industrial Visibility
Maximize ICS Availability with Tripwire Industrial Visibility #outlook a{ padding:0; } body{...