Tripwire Resources

SOHO Wireless Router (In)Security

Research
Tripwire’s Vulnerability and Exposure Research Team (VERT) analyzed the security provided by the most popular wireless routers used in many small and home offices. This ongoing research led to the assignment of 38 Common…
Read More

Five Critical Steps of a Complete Security Risk and Compliance Lifecycle

White Paper
Security and compliance remain at the forefront of concerns facing security leaders today. Tackling the challenge of finding and addressing risks in the enterprise while demonstrating compliance with increasingly demanding regulations requires the…
Read More

Tripwire IP360 Executive Brief

Solution Brief
Understanding security risk on the global enterprise network is essential to comprehensive IT risk management. However, the high rate of change on enterprise networks, the constantly changing threat environment, and increased focus on internal and…
Read More

Top Five NERC CIP Audit Fails

White Paper
Data breaches and the evolving threat landscape are in the global news nearly every day. In this white paper, you'll read insights from investigating these very public breaches that show that attackers were often at work long before the companies…
Read More

The Executive's Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities

White Paper
This publication was designed to assist executives by providing guidance for implementing broad baseline technical controls that are required to ensure a robust network security posture. The author, a security and compliance architect, examined…
Read More

Tripwire NERC Alliance Network Executive Brief

Solution Brief
The NERC Alliance Network is a collaborative group of solution providers whose specialty is to serve power and utility companies that are required to comply with NERC CIP Cyber Security Standards as well as continued reliable delivery of…
Read More

State of Iowa

Case Study
With today’s growing and ever-changing threat landscape, the need for a strong cybersecurity initiative is apparent now more than ever.  But with so many standards, rules, regulations and policies to implement and follow, it’s hard…
Read More

Idaho Power

Case Study
Read More

Client Services, Inc.

Case Study
At Client Services, security is always the company’s top priority—its continuing success depends on it. A debt recovery and call center outsource company for large financial institutions, learn how Client Services leveraged…
Read More

Getting the Most Value from Vulnerability Management and Compliance Programs

White Paper
Enterprise Vulnerability Management (VM) and compliance programs reach their full potential when they are built on well-established foundational goals and tie their output back to those goals. Today’s enterprise-class, state-of-the-art VM and…
Read More

Understanding Your Attack Surface: The First Step in Risk-based Security Intelligence

White Paper
As chief information security officer (CISO), it’s now a job requirement to effectively communicate with your non-technical C-suite and board of directors—preferably not just after there’s been a breach. This is the first in a…
Read More

MAS TRM Guidelines: The Ultimate Authority on Financial Services Security

White Paper
The Monetary Authority of Singapore (MAS), frequently considered the world’s banking and financial services authority, recently issued new legislation, the Technology Risk Management (TRM) guidelines, which will completely change security…
Read More