Tripwire

Portland, OR, USA
1997
Sep 16, 2020   |  By Chris Hudson
In a fast-changing world, stopping to assess your success isn’t really an option anymore. It is increasingly important that security teams are constantly proving their worth and tracking their successes with a view to constantly improving so as to not to get caught behind the times and therefore exposed.
Sep 16, 2020   |  By Ary Widdes
During the late 1990s, security professionals were using information assurance tools in concert with vulnerability scanners to detect and remove vulnerabilities from the systems for which they are responsible. There’s just one problem – each security vendor has its own database with little to no crossover.
Sep 15, 2020   |  By David Bisson
Security culture matters to executives, but these individuals are struggling to implement it. In a November 2019 study commissioned by KnowBe4, 94% of individuals with managerial duties or higher in security or risk management said that security culture was important for their organization’s success.
Sep 14, 2020   |  By Anthony Israel-Davis
The 2020 Cost of Data Breach report from IBM and the Ponemon is out. It provides a detailed analysis of causes, costs and controls that appeared in their sampling of data breaches. The report is full of data, and the website allows you to interact with its information so that you can do your own analysis and/or dig into aspects relevant to you and your industry.
Sep 14, 2020   |  By Ben Layer
A joint cybersecurity advisory released on September 1st detailed technical methods for uncovering and responding to malicious activity including best practice mitigations and common missteps. A collaborative effort, this advisory (coded AA20-245A) is the product of research from the cybersecurity organizations of five nations.
Sep 13, 2020   |  By David Bisson
Security configuration management (SCM) can help organizations do much more than just harden their attack surfaces against intrusions. This fundamental control also has the ability to make your audits flow more smoothly. Indeed, it allows organizations to pull reports from any point in time and demonstrate how their configuration changes and alignments help to support their compliance efforts.
Sep 10, 2020   |  By David Bisson
A phishing attack used real-time validation against an organization’s Active Directory in order to steal users’ Office 365 credentials. According to Armorblox, the phishing attack targeted an executive working at an American brand that was named one of the world’s Top 50 most innovative companies for 2019 on a Friday evening.
Sep 10, 2020   |  By Graham Cluley
European cryptocurrency exchange platform Eterbase has announced that it has suffered a security breach which saw malicious hackers access its network and steal funds worth US $5.4 million. In a message posted on Telegram, the Slovakian cryptocurrency exchange listed the six hot wallets plundered by cybercriminals for their Ether, Tezos, Bitcoin, ALGO, Ripple, and TRON riches.
Sep 9, 2020   |  By Ben Layer
Welcome to the second part of this two-part blog series for administrators who are new to the Chromebook enterprise system. In the previous blog, we discussed settings that are applicable to users and applications. In this blog, we will further explore the Chrome enterprise admin panel as we look into settings that pertain to privacy and physical devices. Device Settings Device settings apply to the physical Chromebook device. They are enforced no matter which user is logged in.
Sep 7, 2020   |  By Matthew Jerzewski
So far, there has not been a perfect solution to ridding the world of software and hardware weaknesses. Keeping up-to-date with which weaknesses have are most common and impactful can be a daunting task. Thankfully, a list has been made to do just that the Common Weakness Enumeration Top 25 (CWE).
Sep 15, 2020   |  By Tripwire
Anthony Israel-Davis, Sr. Manager SaaS Ops at Tripwire, looks at why the risk exposure for a data breach isn't easy to calculate and how risk can be difficult for security leaders to communicate.|
Sep 3, 2020   |  By Tripwire
Tripwire’s latest SaaS application aims to help organizations effectively manage security across complex cloud environments.
Aug 24, 2020   |  By Tripwire
Across the cybersecurity community, there’s wide agreement that the Center for Internet Security’s 20 CIS Controls act as a gold standard framework for system hardening and attack surface reduction. What’s not so widely agreed-upon is the best way to implement the controls, as organizations have a surplus of cybersecurity solutions to choose from to get the job done.
Jul 31, 2020   |  By Tripwire
Tripwire Configuration Manager gives you the ability to monitor the configuration of Amazon Web Services (AWS) and Azure-based assets from a single console. Have your cloud configuration automatically enforced for continuous compliance.
Jul 30, 2020   |  By Tripwire
After the onset of Covid-19, organizations pivoted quickly from a fixed, traditional kind of infrastructure to a virtual, distributed one to support remote workers and enable social distancing. The nature of stop-gap responses to this crisis opens your organization up to more risk, less resiliency and redundancy. How are you going to make sure your flexible architecture and dispersed teams can deal with penetrations, loss of connectivity and other outages? Now, more than ever, comprehensive governance across all of your infrastructure—in both IT and OT networks—is essential.
Jul 24, 2020   |  By Tripwire
It can be difficult to develop and refine cybersecurity initiatives when you face numerous obstacles like legacy systems, architectural changes and much more. Explore how you can effectively establish your security objectives and what you need to meet them with Tripwire's Robert Landavazo and Mike Zavislak from Baker Hughes in this excerpt from the SANS Oil and Gas Solutions Forum.
Jul 16, 2020   |  By Tripwire
Get an in-depth look at the new TIA-700. Embedded with Tripwire Industrial Visibility, the Tripwire Industrial Appliance helps customers gain visibility in their OT networks through a passive asset discovery approach.
Jul 15, 2020   |  By Tripwire
As world-changing events are shaking the foundations of everything we know, Paul Edon, Tripwire's Director of Technical Services, discusses the fundamental principles that cybersecurity was founded on—and how they are relevant today.
Jun 30, 2020   |  By Tripwire
This webinar explores new and emerging risks facing civil service security professionals, system managers and business owners, and provides ways to combat them.Paul Edon, Senior Director for Technical Sales and Services (EMEA) at global cybersecurity provider Tripwire, covers topics including.
Jun 18, 2020   |  By Tripwire
In this video, industry professionals share their perspectives on the key considerations to build an effective, and robust, vulnerability management (VM) program.
Jun 4, 2019   |  By Tripwire
Learn how to use security File Integrity Monitoring effectively and strategically in your organization.
Jan 24, 2019   |  By Tripwire
Achieving DevOps security is as much a cultural effort as it is a technical one, and quality gates present the perfect opportunity to bridge the gap. Because they function within the bounds of regular DevOps processes, tools that bake security into the CI/CD pipeline by way of quality gates are more likely to win DevOps teams over.
Oct 26, 2018   |  By Tripwire
Learn how Log Management can complement SIEM, Security Analytics and Big Data tools within your organization.
Oct 26, 2018   |  By Tripwire
Establish and sustain the Four Essential Pillars of Federal Cybersecurity
Oct 1, 2018   |  By Tripwire
How to introduce security without losing the benefits of containers.
Oct 1, 2018   |  By Tripwire
Learn best practices to mitigate risk, automate compliance and reduce costs.
Sep 1, 2018   |  By Tripwire
Your 10-point DevOps Aligning DevOps and security is more than a matter of getting the right tools in place—it requires a cultural overhaul, too. That means taking a holistic approach to security that makes room for extra training and communication, as well as security tools designed specifically for DevOps. checklist.
Sep 1, 2018   |  By Tripwire
Given the challenges facing those responsible for securing enterprise computing environments, there is no better time to have the integrity talk.
Aug 1, 2018   |  By Tripwire
Your 10-point DevOps security checklist.
Aug 1, 2018   |  By Tripwire
Building a Foundation for Cyber Integrity

Tripwire is a leading provider of integrity assurance solutions that drive security, compliance and operational excellence. As the inventor of file integrity monitoring (FIM), Tripwire has a 20-year history of innovation. Tripwire’s award-winning portfolio includes configuration management, file integrity management, asset discovery, vulnerability management and log collection.

Stop Attacks, Upgrade Operations and Prove Compliance:

  • Monitor system integrity: Tripwire’s industry-leading FIM detects changes on assets across your enterprise, from on-premise data center to public cloud, and remediate them to a known and trusted state. Know who changed your systems with Tripwire Enterprise FIM.
  • Manage network vulnerabilities: Discover and profile all assets on your network with Tripwire IP360. Minimize manual effort through integration with your existing tools and processes. Get complete asset discovery with Tripwire’s easy system remediation.
  • Automate regulatory compliance: Reduce audit workload by leveraging the most extensive policy library in the industry. Automate workflows to achieve and maintain compliance over time with monitoring, audit evidence and reports.
  • Maximize operations uptime: Detect, audit and validate changes across your network to flag unauthorized changes for investigation, reduce unplanned work and speed up MTTR when incidents occur.

Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities, and harden configurations in real time with Tripwire.