Blog
What Is FIM (File Integrity Monitoring)?
By David Bisson on Tue, 01/11/2022
Change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur during an organization’s regular patching cycle, while others cause concern by popping up unexpectedly.
Organizations commonly respond to this dynamism by...
Blog
Prioritizing Changes: File Integrity Monitoring Tools & Best Practices
Tue, 06/30/2020
What does file integrity mean?
There’s not enough time in the day to investigate every system change, which means you need laser-sharp focus to quickly find the greatest risks to your business. However, the ever-evolving capabilities of cyber adversaries—coupled with the dynamic nature of corporate networks—makes security prioritization increasingly difficult.
To combat enterprise cyberthreats...
Blog
Quick Guide to Modern Security Configuration Management
Fri, 01/31/2020
Security configuration management is the cybersecurity process of ensuring systems are properly configured to meet security and compliance standards, reducing cyber risk in the process. The practice of detecting and remediating misconfigurations combines elements of integrity monitoring, configuration validation, vulnerability assessment, and system remediation.
"The reliability of (Tripwire...
Pagination
- First page
- Previous page
- …
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12