Tripwire Resources

Meeting the Security Standards of HIPAA Section 165

White Paper
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and…
Read More

NIST: Improve Your Cybersecurity Posture

White Paper
The broadcast industry has quickly learned that they are not immune from cyber threats, ranging from commandeering for propaganda purposes, to theft of customer data and IP. And a cyber attack on broadcast systems coordinated with a terrorist…
Read More

EMA Report Summary: Achieving High-Fidelity Security

White Paper
When investigating an incident, context is essential in making the most appropriate decisions. Collecting and using high-fidelity data from both the network and the endpoints provides better context to quickly detect and responds to malicious…
Read More

Combating Patch Fatigue: Is IT Overwhelmed to the Detriment of Enterprise Security?

White Paper
Patch management plays a critical role in minimizing security risk for enterprise information technology systems. However, many organizations struggle to keep up with—or find themselves completely overwhelmed by—the volume of…
Read More

Achieving FISMA Compliance: Continuous Monitoring Using Configuration Control and Log Management

White Paper
Obtaining compliance with FISMA can be daunting, including many complex guidelines and procedures that federal agencies and organizations working with the US government must follow. Learn how using security configuration management,…
Read More

Preparing for the CCRI Program

White Paper
Because the Command Cyber Readiness Inspection (CCRI) program increases the stakes for cyber security accountability by holding senior mission commanders at major DOD headquarters, installations and facilities personally responsible for end-to-end…
Read More

Building a Mature Vulnerability Management Program

White Paper
An enterprise vulnerability management program is best able to reach its full potential when it's built on well established foundational goals that address the information needs of all stakeholders, its output is tied back to the goals of the…
Read More

Defending Industrial Control Systems with Tripwire

White Paper
Threats to Industrial Control Systems (ICS) are increasing—a reality that ICS-centric industries have begun to recognize. As a response to the growing need for protection from cyberattacks, the Department of Homeland Security (DHS),…
Read More

Tripwire Vulnerability Scoring System

White Paper
Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by an organization. The challenge of how to measure, and therefore how to manage, risk is…
Read More

Point of Sale or Point of Compromise? Securing POS Systems

White Paper
Retail breaches are the highest profile security stories because they affect hundreds of millions of customers around the world. However, retail security challenges go far beyond preventing credit card theft. The complexities of point-of-sale (POS)…
Read More

SANS - A Maturity Model for Endpoint Security

White Paper
In this paper, SANS introduces a security maturity model specifically for endpoints and reveals how to assess the current state of endpoint security. It also suggests where and how to establish enterprise endpoints as part of the security curve, and…
Read More

Solid Foundations for Cloud Security: Houses Built on Sand or Rock

White Paper
Moving mission critical applications to the cloud provides a whole host of benefits but it also means trusting cloud providers with key aspects of security and compliance. This paper provides tools you can use to evaluate the security and…
Read More