The National Institute of Standards and Technology on Thursday issued two draft publications aimed at securing digital assets: Guide for Security Configuration Management of Information Systems and ...
When it comes to IT security, the typical defensive toolsets garner all the attention: firewalls, antivirus and antispyware apps, as well as intrusion-detection and prevention systems. While they all ...
IT organizations need to become more effective at running cooperative processes across IT security and operations. IT security groups should influence operational security configuration management ...
Portland, OR September 13, 2011 Tripwire, Inc., a leading global provider of IT security and compliance solutions, today announced the next generation of its flagship Tripwire' Enterprise suite, the ...
The study, commissioned by Reach Security, reveals widespread misconfigurations, slow remediation cycles, and manual ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...
PORTLAND, OREGON -- June 25, 2013 -- Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the first installment of an extensive survey ...
Commentary - As computer software has become the backbone of modern civilization, organized cyber criminals, state sponsored cyber attackers and terrorist organizations try to exploit design flaws and ...
New Boundary Technologies today announced availability of its Government Lockdown Solution. Powered by the company's Policy Commander security policy management product, the Government Lockdown ...
PORTLAND, Ore. – April 17, 2018 – Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, has announced expanded support for cloud ...
Feeling vulnerable? Chances are your network is. According to a 2004 Computer Security Institute/FBI study, disruptions from recent security incidents, such as Nimda, Blaster and SoBig, as well as ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results