I’m going to jump on board the Artificial Intelligence/Machine Learning (AI/ML) bandwagon in this blog and talk about why I’m excited about some of the prospects for this being applied to the compliance and file integrity monitoring data that Tripwire has been specialising in for many years. An Analyst’s Ally A problem faced by many security teams is understanding all the signal data collected from their security tools. The risk with “tuning monitoring down” is that you’re often left throwing away data that can be critical in forensic analysis, but in “keeping the volume up” you have to face...
Zero Trust seems to no longer command the volume of articles that once set it up as a trend that promised a bright new future for security. This is in part because security is a journey. Rushed implementations and low returns often result in burnout with new technology, and generally the real work happens in the quiet stages when analysts and consultants are putting together the tooling and playbooks that deliver true value and not just a “checkbox outcome.” I think about this journey often when it comes to Tripwire Enterprise (TE) and File Integrity Monitoring (FIM) in general, as it’s...
Cybersecurity is a critical concern for businesses of all sizes and industries. With the increasing sophistication of cyber threats, it's more important than ever to have a robust security strategy in place. However, many organizations lack the expertise or resources to manage their cybersecurity needs effectively. This is where professional services come in. What are Professional Services? Professional Services (PS) refers to the services provided by a third-party consulting firm to help organizations achieve their business goals. In the context of cybersecurity, professional services firms...
Root Cause Analysis (RCA) is a technique used to identify the underlying reasons for a problem, with the aim of trying to prevent it from recurring in the future. It is often used in change management processes to help identify the source of any issues that arise following any modifications to a system or process. RCA is something Tripwire Enterprise is often deeply tied into too. Before we talk too much about the tooling though, it’s worth setting the scene for RCA, and exploring some common processes involved in the analysis and where it “kicks in” when something goes wrong. What is RCA...
During discussions with clients about their approach to managing IT services, many organizations refer to the Information Technology Infrastructure Library (ITIL) practices as a key component of their approach. This is not surprising, as the ITIL framework provides a practical methodology for IT management, enabling the use of technology to align with business needs. By prioritizing business goals over technology-centric standards, ITIL can be readily applied to a broad range of infrastructure environments, driving continuous improvement and enhancing operational stability. In the fast-moving...
Is your security tool an island? Does it do its singular task with little more to offer than what it says on the package? Too many security offerings behave as singular entities, forcing you to constantly perform task switching to complete a job. If you are using a robust tool, then you may not be taking full advantage of its capabilities. Many capabilities of a good tool can be broadened with the use of an Application Programming Interface (API) “Application Programming Interface” sounds like it’s going to be an ominously complicated topic, but it’s something you should take notice of when...
Anyone reading this post will have at least dipped their toes into the world of cloud services. As a result of this massive growth, the world of compliance has spent much of the last decade catching up with the implications of cloud services. For hosted infrastructure, “catching up” presents an interesting set of challenges since […]… Read More
The post Regulatory Compliance in the Cloud: What you Need to Know appeared first on The State of Security.
A recent survey conducted by IBM and Censuswide of the UK market explored some of the drivers for modernisation and revealed some interesting challenges that organisations currently face as more and more businesses expand their digital boundaries. The most interesting finding was the that one of the drivers for modernisation (according to 28% of participants […]… Read More
The post Regulatory Compliance – Holding Security Back or Forcing us to Reassess old biases? appeared first on The State of Security.