Tripwire Resources

Foundational Security Controls survey

Research
According to a report by the United States Computer Emergency Readiness Team (US-CERT), 96% of successful data breaches could be avoided if simple or intermediate security controls were implemented.  Read this Tripwire-sponsored survey of…
Read More

The Prescriptive Guide to Operational Excellence

Book
In the Prescriptive Guide, you'll find specific how-to assistance from experts in IT governance, security, compliance and IT operations that will help you reduce unplanned work, mitigate risk and free up IT staff for more strategic…
Read More

Achieving FISMA Compliance: Continuous Monitoring Using Configuration Control and Log Management

White Paper
Obtaining compliance with FISMA can be daunting, including many complex guidelines and procedures that federal agencies and organizations working with the US government must follow. Learn how using configuration control and log management…
Read More

Effective Security with a Continuous Approach to ISO 27001 Compliance

White Paper
The Tripwire® Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can…
Read More

Own Your Network with Continuous Monitoring

White Paper
Most organizations have to or want to implement continuous monitoring of their network. Yet a flood of guidance on how to get started with it adds more confusion than clarification. In this SANS white paper, learn about the four basic components of…
Read More

SANS - Implementing the Critical Security Controls

White Paper
Since the SANS Institute hosted the first version of the Critical Security Controls (CSC) in 2008, the controls have been upgraded four times to meet demands of an evolving threat and vulnerability landscape. During that time, the Department of…
Read More

Reducing Risk: Implementing SANS Critical Security Controls 1–4

White Paper
The trend line for cybersecurity crimes continues to increase, with no signs of a meaningful decrease on the horizon. Is there anything an organization can do to stop these attacks from occurring and protect their critical information…
Read More

Continuous Security Monitoring, a Securosis white paper

White Paper
Given that one can never get ahead of IT security threats, successful protection of critical data means effectively deterring—and then reacting faster to—attacks. Yet, a bulk of security spending goes toward outdated controls that do…
Read More

Tripwire Vulnerability Scoring System

White Paper
Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by an organization. The challenge of how to measure, and therefore how to manage, risk is…
Read More

The Tripwire Precision Metric: Proactively Improving the Quality of Vulnerability Management

White Paper
The Tripwire Vulnerability and Exposure Research Team (VERT) developed the Precision Metric in order to provide a means of quantifying the quality of vulnerability and application signatures in Tripwire® IP360™. The goal of using the…
Read More

Sustaining SOX Compliance

White Paper
Since the adoption of SOX, much has been learned about IT compliance. Discover how to make SOX efforts more effective in "Sustaining Sox…
Read More

SANS: Secure Configuration Management Demystified

White Paper
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall …
Read More