Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzer
One of the hardest parts of managing an organization’s cybersecurity is patch management. Just as…
CIS Control 08: Audit Log Management
Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing…
BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products
BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and…
INTERPOL Pushes for "Romance Baiting" to Replace "Pig Butchering" in Scam Discourse
INTERPOL is calling for a linguistic shift that aims to put to an end to…
Effective Phishing Campaign Targeting European Companies and Organizations
A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder,…
Phishing in Disguise: How Email Security Brand Spoofing Erodes Trust
Author: Clint IlaganA secure email is an email that uses encryption and authentication to protect…
When and Where SIEM Fits in Healthcare IT Settings | Huntress
Understanding SIEM’s benefits, limitations, and best applications in a strong healthcare security stack
Fraud Funding Terrorism? The Cost of Missing Sanctioned Connections in a Globalized Fraud Ecosystem
Editor's note: The following blog post originally appeared on Levi Gundert's Substack page.IntroductionA past conversation…