Tripwire Resources

Building a Mature Vulnerability Management Program

White Paper
An enterprise vulnerability management program is best able to reach its full potential when it's built on well established foundational goals that address the information needs of all stakeholders, its output is tied back to the goals of the…
Read More

Defending Industrial Control Systems with Tripwire

White Paper
Threats to Industrial Control Systems (ICS) are increasing—a reality that ICS-centric industries have begun to recognize. As a response to the growing need for protection from cyberattacks, the Department of Homeland Security (DHS),…
Read More

Tripwire Vulnerability Scoring System

White Paper
Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by an organization. The challenge of how to measure, and therefore how to manage, risk is…
Read More

Point of Sale or Point of Compromise? Securing POS Systems

White Paper
Retail breaches are the highest profile security stories because they affect hundreds of millions of customers around the world. However, retail security challenges go far beyond preventing credit card theft. The complexities of point-of-sale (POS)…
Read More

SANS - A Maturity Model for Endpoint Security

White Paper
In this paper, SANS introduces a security maturity model specifically for endpoints and reveals how to assess the current state of endpoint security. It also suggests where and how to establish enterprise endpoints as part of the security curve, and…
Read More

Solid Foundations for Cloud Security: Houses Built on Sand or Rock

White Paper
Moving mission critical applications to the cloud provides a whole host of benefits but it also means trusting cloud providers with key aspects of security and compliance. This paper provides tools you can use to evaluate the security and…
Read More

Responding to High-impact Vulnerabilities: Are you prepared?

White Paper
In information security, it’s often said, “It’s not a matter of if, but when” an organization will be hit by a breach—it's an accepted fact that preventative controls will eventually fail to keep attackers out. And now,…
Read More

Windows Server 2003 End of Extended Support Hardening Guide

White Paper
Will you be running Windows Server 2003 after End of Extended Support ends? If so, download this hardening guide to learn how to protect your systems long after Microsoft bows out.  
Read More

Cyber-Risk Oversight Handbook

White Paper
This handbook provides five principles for directors on how to balance cybersecurity and profitability in this rapidly evolving cyber-threat landscape. It has been created by the National Association of Corporate Directors, in conjunction with the…
Read More

When Cyber Attacks Get Physical: ICS Attack Scenarios and CIP-007 R1

White Paper
Due to a dramatic uptick in targeted attacks against power grids, banks and transportation networks around the world, there is a good chance that a cyber attack against nearly any country’s critical infrastructure could be imminent. These…
Read More

Enterprise of Things Report

Research
The Internet of Things describes the growing number of intelligent objects that are being connected to the Internet. These devices are also expected to bring a range of new security and risk challenges to the enterprise. The objective of this…
Read More

Mind the Gap: Using Vulnerability Management to Close the Enterprise Cyber Threat Gap

White Paper
The problem for most enterprises today is information overload. Attacks are becoming more sophisticated while increasing at a pace that IT professionals simply can’t keep up with. A data breach is not a matter of if but when, so…
Read More