Category: Blog RSS Feed

Time for an IoT Audit?

IoT is everywhere, quietly powering everything from smart thermostats in homes to complex systems in industrial networks. While these devices bring incredible convenience and innovation, they also open the door to significant cybersecurity risks, especially in manufacturing and similarly sensitive…

A New Era of Global Privacy Complexity

It’s no longer enough for CIOs to check boxes and tick off compliance milestones. The world has changed — and with it, the data privacy landscape. From the GDPR in Europe to California’s CCPA, and now Brazil’s LGPD and India’s…

A New Era of Global Privacy Complexity

It’s no longer enough for CIOs to check boxes and tick off compliance milestones. The world has changed — and with it, the data privacy landscape. From the GDPR in Europe to California’s CCPA, and now Brazil’s LGPD and India’s…

Out-of-Band Update: Tripwire Enterprise 9.3.1

Tripwire Enterprise 9.3.1 is now available for download in the Tripwire Customer Center. This is an out-of-band update initiated to address two issues discovered in our recent 9.3 release that we felt should be resolved before the next scheduled release…

Does Your Organization Need Deepfake Defenses?

Picture this: you’re scrolling through your company’s social media feed, and suddenly a video shows your CEO endorsing a competitor’s product. It looks real. The voice, the gestures, the background—it’s all perfect. Or that same CEO calling you to urgently…

Securing Against Phishing Beyond Email

Phishing is no longer just an email problem. Reports state that 40% of phishing campaigns now span channels beyond email, hitting collaboration tools like Slack and Teams, plus SMS, and social media platforms. Voice phishing (“vishing”) in particular is on…

Aligning Software Security Practices with the EU CRA Requirements

As the European Cyber Resilience Act (CRA)’s enforcement date approaches (October 2026), cybersecurity requirements on manufacturers, developers, and service providers responsible for software and hardware connected to the internet will need to start thinking – if they haven’t already -about…

5 Critical Security Risks Facing COBOL Mainframes

COBOL remains deeply embedded in the infrastructure of global enterprises, powering critical systems in banking, insurance, government, and beyond. While its stability and processing efficiency are unmatched, legacy environments running COBOL face a growing challenge: Security. As cyber threats evolve…

Essential Features to Look for in a VM Solution

Why Choosing the Right VM Tool Matters Your vulnerability management solution is the fuel that powers the rest of your strategic cybersecurity objectives. Put good in, get good out. That’s why the vulnerability management tool you choose matters. And there…