tools
Penetration Testing in 2022: Key Trends and Challenges
Tripwire Guest Authors | | Core Security, IT Security and Data Protection, pen testing, Penetration Testing, Report, tools
Just when you thought that we couldn’t be any more integrated with (and dependent on) technology, the Covid pandemic swooped in to prove otherwise. The rise in the use of applications and ...
Your Guide to the NIST Cybersecurity Framework
Tripwire Guest Authors | | NIST, NIST Cybersecurity Framework, nist framework, Security Controls, tools
To put the impact of cybercrime into perspective, let’s examine some important, and startling, numbers: Data breach costs increased from $3.86 million to $4.24 million in 2021. Every 39 seconds, there is ...
SAST vs. DAST: What’s the Difference?
Considering the threats posed by the digital world, organizations today must think about security and the way it affects their software. With business outcomes and revenue ... The post SAST vs. DAST: ...

Proliferation of DevOps Tools Introduces Risk
One of the main contributors to the weak security posture of development environments is the complexity and knowledge gap created by the number of tools and services involved in this process. With ...
Security Boulevard
The Hidden Benefits of Compliance
Christopher Minori | | Audit, compliance policy management, Policies and Procedures, Regulatory Compliance, tools
If I were to ask you why you scanned for compliance at your company, I’d bet you’d tell me it was to help you pass requirements easier, to ensure that your audits ...
Lessons from Teaching Cybersecurity: Week 6
As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a ...

5 Essential Steps to Improve Cybersecurity Maturity
Tripwire Guest Authors | | Automation, Cyber Security, cybersecurity awareness, Featured Articles, maturity, tools
From small- and medium-sized organizations to large enterprises, every business is under continuous threat of security risk in today’s digital world. With the growing digital footprint and cloud adoption, organizations continue to ...

Efficient audits with machine learning and Slither-simil
Noël Ponthieux | | audits, experiment, Internship Projects, machine learning, Slither, smart contracts, tools
by Sina Pilehchiha, Concordia University Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now we’re exploring how to use this data to make the smart contract ...

PrivacyRaven Has Left the Nest
By Suha S. Hussain, Georgia Tech If you work on deep learning systems, check out our new tool, PrivacyRaven—it’s a Python library that equips engineers and researchers with a comprehensive testing suite ...

A Guide to Finding a Trusted MSSP
MSSPs can be essential in helping organizations complete their security posture. Here’s what to look for. Enterprises often lack the internal resources to do security right, especially considering tasks and responsibilities are ...
Security Boulevard