Tripwire Assets & Resources
When Australia’s Griffith University needed to monitor the activity of their infrastructure, they turned to Tripwire® Log Center®. Learn how they achieved a comprehensive view of activity in an affordable, easy-to-use and manage…
Are US Federal IT Pros Overconfident in Data Breach Detection Skills?
Tripwire studied confidence vs. knowledge of US federal IT security pros on seven key security controls necessary to detect a data breach. For many controls, IT pros believed they had the information necessary to detect a breach quickly but provided contradictory information about the specific data.
MITRE ATT&CK Matrix with CIS Controls and Tripwire Mapping
It’s not enough to cast a wide cybersecurity net and hope you catch the adversaries trying to compromise your data.
SANS Spotlight: Back to Basics
This white paper, authored in partnership with the SANS Institute, lays out a six-step guide to help you achieve cyber integrity across your entire agency or organization
Foundational Controls Buyer's Guide
Learn how to build a solid foundation for your security and compliance programs.
Foundational Controls: The Key to Defending Against Cyberattacks
Effectively protect your organization using basic security controls.
Security Execs, It's Time We Had the Integrity Talk
Given the challenges facing those responsible for securing enterprise computing environments, there is no better time to have the integrity talk.
Foundational Controls Survey
Threat Prevention is Foundational
Designing the Foundations of a Secure Organization
Foundational Controls may not sound like the appealing subject in IT, but arguably they’re the most critical. And for good reason. Quite simply, without fundamental controls in place and accurate knowledge of what is on your network, your organization will find it incredibly difficult to manage a breach and effectively remediate.
Join Amar Singh, CEO & Founder of Cyber Management Alliance, and David Mckissick, Senior Systems Engineer at Tripwire, for a discussion on design the foundations of a secure organization.
With most financial institutions ranking security as a top-level concern, banks are seeking ways to protect their IT infrastructure against threats such as data breaches or hacking incidents. Banks are also subject to strict industry standards and…
Sustaining SOX Compliance Through Automation
Learn best practices to mitigate risk, automate compliance and reduce costs.