Tripwire

1997
Portland, OR, USA
May 19, 2019   |  By Lamar Bailey
Open Source projects can be a great asset, or they can be a curse – it’s all in how you manage it. To be successful in using open source, there are several things to keep in mind, from licensing to updates. And if you ignore any of them, it can cause problems. Here are some things to consider.
May 15, 2019   |  By Tripwire Guest Authors
It was only a few years back that cloud technology was in its infancy and used only by tech-savvy, forward-thinking organisations. Today, it is commonplace. More businesses than ever are making use of cloud services in one form another. And recent statistics suggest that cloud adoption has reached 88 percent. It seems that businesses now rely on the technology for day-to-day operations.
May 15, 2019   |  By Tripwire Guest Authors
Perhaps it’s too melodramatic to claim that the debate over how to define a data breach “rages on” because we haven’t seen bodies flying out of windows yet, but it is a serious question with genuine financial ramifications now that the General Data Protection Regulation (GDPR) and its accompanying fines for mishandling data have arrived to save (and sometimes confuse) the day.
May 13, 2019   |  By Tripwire Guest Authors
Cyber security assessment initiatives and frameworks abound in the US government, the most important being the Federal Information Systems Management Act (FISMA), passed in 2002. The law’s broad scope included a mandate to the US National Institute of Standards and Technology (NIST), charging it to create methods and standards to assess and optimize the cybersecurity posture of US government agencies.
May 7, 2019   |  By Tripwire Guest Authors
Modern digital & cloud technology underpins the shift that enables businesses to implement new processes, scale quickly and serve customers in a whole new way. Historically, organisations would invest in their own IT infrastructure to support their business objectives, and the IT department’s role would be focused on keeping the ‘lights on.’ To minimize the chance of failure of the equipment, engineers traditionally introduced an element of redundancy in the architecture.
Jan 24, 2019   |  By Tripwire
Achieving DevOps security is as much a cultural effort as it is a technical one, and quality gates present the perfect opportunity to bridge the gap. Because they function within the bounds of regular DevOps processes, tools that bake security into the CI/CD pipeline by way of quality gates are more likely to win DevOps teams over.
Oct 26, 2018   |  By Tripwire
Establish and sustain the Four Essential Pillars of Federal Cybersecurity
Oct 26, 2018   |  By Tripwire
Learn how Log Management can complement SIEM, Security Analytics and Big Data tools within your organization.
Oct 1, 2018   |  By Tripwire
How to introduce security without losing the benefits of containers.
Oct 1, 2018   |  By Tripwire
Learn best practices to mitigate risk, automate compliance and reduce costs.
Mar 25, 2019   |  By Tripwire
Tripwire CTO David Meltzer and Lamar Bailey, Director of Security Research and Development, discuss the main challenges and pain points as DevSecOps comes of age, sharing their recommendations and predictions in this video interview with Information Security Media Group at RSA Conference 2019.
Feb 27, 2019   |  By Tripwire
Do you know what's on your ICS network? Join Tripwire industrial cybersecurity experts Zane Blomgren and Robert Landavazo in this on-demand webinar for a virtual tour of the first cohesive solution providing visibility, monitoring, and threat mitigation across the complete OT landscape.
Nov 9, 2018   |  By Tripwire
Join Claroty and Tripwire for a first-ever, executive conversation on the future of industrial cybersecurity.
Nov 9, 2018   |  By Tripwire
Join Robert Landavazo, Tripwire ICS expert, as he explores the various cybersecurity frameworks for ICS like NERC CIP, AWWA, IEC-62443, and NIST-800-82 and their applicability in various industrial environments.
Nov 1, 2018   |  By Tripwire
Is it time to fire your vulnerability management (VM) provider? VM is one of the most critical components of any effective security strategy, but not all VM solutions have the capabilities needed to keep pace with your organization’s goals for a mature cybersecurity program.