Tripwire Resources

Own Your Network with Continuous Monitoring

White Paper
Most organizations have to or want to implement continuous monitoring of their network. Yet a flood of guidance on how to get started with it adds more confusion than clarification. In this SANS white paper, learn about the four basic components of…
Read More

SANS - Implementing the Critical Security Controls

White Paper
Since the SANS Institute hosted the first version of the Critical Security Controls (CSC) in 2008, the controls have been upgraded four times to meet demands of an evolving threat and vulnerability landscape. During that time, the Department of…
Read More

Reducing Risk: Implementing SANS Critical Security Controls 1–4

White Paper
The trend line for cybersecurity crimes continues to increase, with no signs of a meaningful decrease on the horizon. Is there anything an organization can do to stop these attacks from occurring and protect their critical information…
Read More

Continuous Security Monitoring, a Securosis white paper

White Paper
Given that one can never get ahead of IT security threats, successful protection of critical data means effectively deterring—and then reacting faster to—attacks. Yet, a bulk of security spending goes toward outdated controls that do…
Read More

Tripwire Vulnerability Scoring System

White Paper
Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by an organization. The challenge of how to measure, and therefore how to manage, risk is…
Read More

The Tripwire Precision Metric: Proactively Improving the Quality of Vulnerability Management

White Paper
The Tripwire Vulnerability and Exposure Research Team (VERT) developed the Precision Metric in order to provide a means of quantifying the quality of vulnerability and application signatures in Tripwire® IP360™. The goal of using the…
Read More

Sustaining SOX Compliance

White Paper
Since the adoption of SOX, much has been learned about IT compliance. Discover how to make SOX efforts more effective in "Sustaining Sox…
Read More

SANS: Secure Configuration Management Demystified

White Paper
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall …
Read More

Security Configuration Management: Moving Beyond Praise to Results

White Paper
A whole host of industry recognized sources, including Gartner, Securosis and SANS have been consistently recommending security configuration management (SCM) as one of the top, if not the top, security controls you can implement to protect your IT…
Read More

10 Steps to Risk-Based Security Management

White Paper
Many professionals in information security espouse the belief—and commitment to—"risk-based” security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment…
Read More

IT Security Budget Forecast Roundup 2014 for CIOs and CSO/CISOs

White Paper
Each year, numerous industry research reports provide budget forecasting on expected spending for worldwide IT. Some add a focus within specific industries as well as technologies, but very few focus strictly on IT security. Bringing a few of the…
Read More

Five Critical Steps of a Complete Security Risk and Compliance Lifecycle

White Paper
Security and compliance remain at the forefront of concerns facing security leaders today. Tackling the challenge of finding and addressing risks in the enterprise while demonstrating compliance with increasingly demanding regulations requires the…
Read More