Blog
Managed Cybersecurity Services Secure Modern Environments
By Troy Thompson on Mon, 03/25/2024
Image
In an era characterized by relentless digital transformation and interconnectedness, cybersecurity has evolved into a complex and dynamic battleground.
Businesses, governments, and individuals find themselves locked in a perpetual struggle against a relentless flood of evolving threats. From sophisticated cybercriminal...
Blog
Expert Insight for Securing Your Critical Infrastructure
By Ted Rassieur on Mon, 01/15/2024
Image
At Tripwire's recent Energy and NERC Compliance Working Group, we had the opportunity to speak with the Manager of Gas Measurement, Controls, & Cybersecurity at a large energy company. More specifically, we focused on SCADA and field assets of gas Operational Technology. The experience at the management level of such an...
Blog
Tips for Achieving Success With a NERC CIP Audit
By Jim Fisher on Wed, 12/13/2023
Image
Electrical utilities are responsible for just about everything we do. This presents a tremendous burden on those who operate those utilities. One way these organizations offer assurance is through the audit process. While audits can generate tremendous anxiety, good planning, and tools can help make the entire process go...
Blog
Guarding the Grid: Navigating the Current and Future Landscape of Utility Cybersecurity
By Travis Emerson on Mon, 11/27/2023
Image
Tripwire recently held its annual Energy and NERC Compliance Working Group. This year's attendees included more than 200 Tripwire customer utility personnel representing over 80 different registered entities from all across the US and Canada. The company sizes ranged from public utility districts and city municipalities to...
Blog
How MSSPs Help with Cybersecurity Compliance
By Zack Jessee on Wed, 10/04/2023
Image
While always a part of business, compliance demands have skyrocketed as the digital world gives us so many more ways to go awry. We all remember the Enron scandal that precipitated the Sarbanes-Oxley Act (SOX). Now, SOX compliance means being above board on a number of cybersecurity requirements as well.
Fortra's Tripwire...
Blog
What is NERC? Everything you need to know
By Michael Betti on Tue, 10/03/2023
Image
Electric grids are part of every nation’s critical infrastructure. Every societal activity and business depends on reliable and safe electricity distribution. The US electric grid is a huge network of powerlines, distribution hubs, and renewable and non-renewable energy generators that is increasingly exposed to cyber-physical...
Blog
Increasing Your Business’ Cyber Maturity with Fortra
By Antonio Sanchez on Wed, 09/20/2023
Image
When building a tower, it helps to start with a sturdy foundation. Cyber maturity is the tower, and there are three levels that build it:
Foundational IT/OT & Security Control Processes
Fundamental Security Control Capabilities
Advanced Security Control Capabilities
Fortra occupies a unique space in the industry because of...
Blog
Working with a Reliable Partner for Cybersecurity Success
By Joe Pettit on Thu, 08/31/2023
Image
Technology companies are often seen as revolving doors of constantly shifting personnel. Whether they are seeking a better work environment or chasing a higher paycheck, these staff changes can hurt an organization’s progress. Worse yet, the customers are often negatively impacted by these changes in the continuity of...
Case Study
Tripwire and Astro Making Best Practices a Daily Show
Assessing and managing vulnerabilities is a core cybersecurity practice, but it can put a heavy strain on IT security and operations teams. In many cases, introducing vulnerability management as a service is what’s necessary to overcome the challenge of accumulating vulnerabilities across complex IT environments—especially when time and resources are limited.
This was the case...
Blog
Managed Vulnerability Management? Yes, You Read That Right
By Editorial Staff on Tue, 04/16/2019
Image
The importance of a mature vulnerability management program can’t be overstated. File integrity monitoring (FIM) and security configuration management (SCM) might be the bedrock of a strong cybersecurity program, but they can only go so far. Scanning for vulnerabilities needs to be a foundational part of your program, too. The...