Tripwire Resources

Windows Server 2003 End of Extended Support Hardening Guide

White Paper
Will you be running Windows Server 2003 after End of Extended Support ends? If so, download this hardening guide to learn how to protect your systems long after Microsoft bows out.  
Read More

Cyber-Risk Oversight Handbook

White Paper
This handbook provides five principles for directors on how to balance cybersecurity and profitability in this rapidly evolving cyber-threat landscape. It has been created by the National Association of Corporate Directors, in conjunction with the…
Read More

When Cyber Attacks Get Physical: ICS Attack Scenarios and CIP-007 R1

White Paper
Due to a dramatic uptick in targeted attacks against power grids, banks and transportation networks around the world, there is a good chance that a cyber attack against nearly any country’s critical infrastructure could be imminent. These…
Read More

Enterprise of Things Report

Research
The Internet of Things describes the growing number of intelligent objects that are being connected to the Internet. These devices are also expected to bring a range of new security and risk challenges to the enterprise. The objective of this…
Read More

Mind the Gap: Using Vulnerability Management to Close the Enterprise Cyber Threat Gap

White Paper
The problem for most enterprises today is information overload. Attacks are becoming more sophisticated while increasing at a pace that IT professionals simply can’t keep up with. A data breach is not a matter of if but when, so…
Read More

Reduzieren Sie Die Compliance-Kosten: Die 3 Effektivsten Strategien

White Paper
Reduzieren der Compliance-Kosten: Die 3 effektivsten Strategien Die meisten Experten für IT-Sicherheit und Compliance finden es angesichts geringerer Budgets schwierig, ihre Ziele hinsichtlich Datenschutz zu erreichen. Neue Berichte, wie z.…
Read More

The Prioritized Approach to Pursue PCI DSS Compliance

White Paper
By its comprehensive nature, the PCI DSS 3.0 standard provides a large  amount of information about security – so much that some people who are responsible for cardholder data security may wonder where to start the continuous journey of…
Read More

Achieving FISMA Compliance: Continuous Monitoring Using Configuration Control and Log Management

White Paper
Obtaining compliance with FISMA can be daunting, including many complex guidelines and procedures that federal agencies and organizations working with the US government must follow. Learn how using configuration control and log management…
Read More

Effective Security with a Continuous Approach to ISO 27001 Compliance

White Paper
The Tripwire® Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can…
Read More

Own Your Network with Continuous Monitoring

White Paper
Most organizations have to or want to implement continuous monitoring of their network. Yet a flood of guidance on how to get started with it adds more confusion than clarification. In this SANS white paper, learn about the four basic components of…
Read More

SANS - Implementing the Critical Security Controls

White Paper
Since the SANS Institute hosted the first version of the Critical Security Controls (CSC) in 2008, the controls have been upgraded four times to meet demands of an evolving threat and vulnerability landscape. During that time, the Department of…
Read More

Reducing Risk: Implementing SANS Critical Security Controls 1–4

White Paper
The trend line for cyber security crimes continues to increase, with no signs of a meaningful decrease on the horizon. Is there anything an organization can do to stop these attacks from occurring and protect their critical information…
Read More