Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzer

One of the hardest parts of managing an organization’s cybersecurity is patch management. Just as…

CIS Control 08: Audit Log Management

Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing…

BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products

BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and…

INTERPOL Pushes for "Romance Baiting" to Replace "Pig Butchering" in Scam Discourse

INTERPOL is calling for a linguistic shift that aims to put to an end to…

Effective Phishing Campaign Targeting European Companies and Organizations

A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder,…

Phishing in Disguise: How Email Security Brand Spoofing Erodes Trust

Author: Clint IlaganA secure email is an email that uses encryption and authentication to protect…

When and Where SIEM Fits in Healthcare IT Settings | Huntress

Understanding SIEM’s benefits, limitations, and best applications in a strong healthcare security stack

Fraud Funding Terrorism? The Cost of Missing Sanctioned Connections in a Globalized Fraud Ecosystem

Editor's note: The following blog post originally appeared on Levi Gundert's Substack page.IntroductionA past conversation…