Blog Posts Tagged with "TripWire"

Bd07d58f0d31d48d3764821d109bf165

Infosec Fill-in-the-Blank: Security BSides Las Vegas Edition

August 08, 2012 Added by:Tripwire Inc

The hardest part about security is...? Security BSides Las Vegas attendees finished the sentence, and Infosec Island‘s Anthony M. Freed caught them on camera. The responses range from insightful to geeky, depressing to funny, and some are harsh, some others pragmatic, but all are quite sage...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Join Infosec Island and Tripwire at Black Hat USA 2012

July 10, 2012 Added by:Infosec Island Admin

Black Hat remains the biggest and the most important technical security conference series in the world by delivering timely, actionable security information in a vendor-neutral environment. Infosec Island would like to extend a special thanks to Tripwire for making possible our presence at the event...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Join Infosec Island and Tripwire at Security BSides Las Vegas

June 27, 2012 Added by:Infosec Island Admin

Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Webcast: Risk-Based Security Management

June 20, 2012 Added by:Tripwire Inc

RBSM is defined as applying rigorous and systematic analytical techniques to evaluate the risks that impact an organization’s information assets and IT infrastructure. Tripwire and Ponemon Institute researched the state of risk management and came up with some interesting findings. Join us for this webcast...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Tripwire Examines the State of Risk-Based Security Management

June 14, 2012 Added by:Headlines

"Though organizations profess a commitment to RBSM... this security practice is still in its infancy. To establish an effective... program, certain barriers need to be addressed. These include securing adequate resources, having employees with the necessary expertise and designating strong leaders..."

Comments  (0)

39728eff8ac87a48cfb050f0df29ceaa

Effective SIEM: Less Turtle - More Awareness

January 12, 2012 Added by:John Linkous

SIEM tools are highly focused on events. Even in cases where a SIEM can look outside of the world of events at one or two other pieces of data - say, at network traffic - that’s still woefully inadequate. We certainly need events and network traffic data...

Comments  (0)


Most Liked