The State of Security - Edition #10

The State of Security - Edition #10

?? Welcome to the tenth edition of The State of Security monthly LinkedIn newsletter.

?? As part of Fortra's Tripwire, we at the State of Security recognize the crucial role that technological solutions play in the cybersecurity strategies of many organizations. Nonetheless, we also understand that technology represents only one facet of effective security. Ultimately, it is people who protect people.

??? Our monthly LinkedIn newsletter serves to continue our mission of providing spaces for the cybersecurity community to share news, commentary, and resources.

??? This month, we take a look at a malware strain targeting macOS - NotLockBit, the history and evolution of File Integrity Monitoring, best practices for SCM and why it matters, and much more!


NotLockBit: Ransomware Discovery Serves As Wake-Up Call For Mac Users

The discovery of the "NotLockBit", a malware strain targeting macOS, serves as a reminder for Mac users to remain vigilant about their security.

Learn more about this emerging threat in Graham Cluley's blog: https://www.tripwire.com/state-of-security/notlockbit-rransomware-discovery-serves-wake-call-mac-users


Why Security Configuration Management (SCM) Matters

Why Security Configuration Management (SCM) Matters

SCM helps monitor, detect, and maintain secure configurations—don't leave room for error.

Dive into the best practices for robust SCM and see how SCM protects your systems: https://www.tripwire.com/state-of-security/why-security-configuration-management-matters


The Past, Present, and Future of File Integrity Monitoring

The Past, Present, and Future of File Integrity Monitoring

How has File Integrity Monitoring evolved over the years?

Dive into its past, present, and future to understand why it’s critical to security and compliance: https://www.tripwire.com/state-of-security/past-present-and-future-file-integrity-monitoring


CIS Control 16: Application Software Security

Protect your apps from the inside out with CIS Control 16.

Learn how to use SSDF to secure every phase of the software lifecycle: https://www.tripwire.com/state-of-security/cis-control-16


To stay up to date with all the great content on the State of Security, you can sign up for our weekly newsletter here.

要查看或添加评论,请登录