tools
3 Best Practices to Improve Threat Hunting
Threat-hunting programs can proactively monitor malicious activity, find vulnerabilities and put organizations on the offensive ...
Security Boulevard
Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools
More than half of cybersecurity leaders would replace their entire current stack of platforms if there were no budget constraints ...
Security Boulevard
Fortinet Adds Generative AI Tool to Security Operations Portfolio
Fortinet's generative AI tool eliminates a range of manual tasks that security operations teams would otherwise need to perform ...
Security Boulevard
Is Trafficking in Hacking Information a Crime?
Quincy Compton of Concord, North Carolina, had a wife and a pregnant girlfriend and wrote to a doctor in Washington, D.C. for information about terminating a pregnancy. The doctor, Thomas Kemp, wrote ...
Security Boulevard
Debunking 5 Myths About Detection-as-Code
Would you let misconceptions keep you from adopting a tool that can help your security team do its best work? In my ten years of building security monitoring solutions, I learned that ...
Security Boulevard
Is a 10-Year-Old Facebook Technology the Future of Cloud Security?
In the pantheon of semi-obscure open source tools, osquery is one that deserves a closer look from most security professionals. It’s easy to see why this old Facebook tool that was originally ...
Security Boulevard
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 5, 2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us ...
Get your SOCKS on with gTunnel
Get Your SOCKS on with gTunneltl;drSteps to setup a wicked fast SOCKS proxy with a tool called gTunnel written by hotnopsForewordFirst and foremost, I would like to take a moment to commemorate my first ...
Penetration Testing in 2022: Key Trends and Challenges
Tripwire Guest Authors | | Core Security, IT Security and Data Protection, pen testing, Penetration Testing, Report, tools
Just when you thought that we couldn’t be any more integrated with (and dependent on) technology, the Covid pandemic swooped in to prove otherwise. The rise in the use of applications and ...
Your Guide to the NIST Cybersecurity Framework
Tripwire Guest Authors | | NIST, NIST Cybersecurity Framework, nist framework, Security Controls, tools
To put the impact of cybercrime into perspective, let’s examine some important, and startling, numbers: Data breach costs increased from $3.86 million to $4.24 million in 2021. Every 39 seconds, there is ...