Blog
Why File Integrity Monitoring (FIM) Is a Must for Compliance — And How to Pick the Right Solution
By Katrina Thompson on Thu, 09/11/2025
As Fortra’s new File Integrity Monitoring Buyer’s Guide states, “What was once a security control for simple file changes now ensures integrity across organizations’ entire systems.” The landscape has evolved significantly since Fortra’s Tripwire introduced file integrity monitoring (FIM) over twenty years ago.But that’s exactly why the industry is due for a new look at what makes a FIM solution...
Blog
Understanding the OWASP AI Maturity Assessment
By Josh Breaker-Rolfe on Mon, 09/29/2025
Today, almost all organizations use AI in some way. But while it creates invaluable opportunities for innovation and efficiency, it also carries serious risks. Mitigating these risks and ensuring responsible AI adoption relies on mature AI models, guided by governance frameworks. The OWASP AI Maturity Assessment Model (AIMA) is one of the most practical. In this article, we’ll explore what it is,...
Guide
PCI DSS Resource Toolkit
Use this toolkit to gain a deeper understanding of where you stand with regards to your PCI DSS compliance program and the transition to PCI DSS 4.0. Establishing PCI DSS compliance goes beyond technical tools and processes: It also requires a shift in thinking about compliance as a cybersecurity process. Lean on advice from compliance experts to help you make consistent progress toward your goals...
Guide
The Five Stages of Vulnerability Management Maturity
Is your vulnerability management program ready for DevOps, cloud infrastructure, and the evolving threat landscape? Many organizations have already developed a mature VM program for their traditional enterprise and application platforms. But radical new shifts in the tech ecosystem mean you will need to protect your systems on new platforms and...
Guide
Staying Current With the Transportation Security Administration’s Oil and Gas Security Directives
Escalating cyberthreats in the oil and gas industry underscore the need for collaboration between public and private sectors to mitigate this national security risk, and much of this responsibility falls on individual pipeline operators who need to comply with the Transportation Security Administration (TSA) Security Directive.Despite being best known...
Why Privacy Matters in Cybersecurity
Mon, 06/27/2022
In this episode, Jarell Oshodi, Deputy Chief Privacy Officer for the Centers for Disease Control and Prevention, discusses the role of privacy in the cybersecurity field. As an attorney, she brings a unique perspective to the conversation on how we can work better with our privacy officers. ...
Datasheet
How Tripwire Helps Control Change
A standard enterprise IT environment is typically composed of widely disparate hardware from multiple vendors running a variety of operating systems and can be spread across multiple datacenters, worksites and the cloud. Because of this growing distribution of IT assets and ever-growing sensitivity of data assets, there is an increased need for adherence to industry standards, government...
Guide
Cybersecurity for Work-From-Home Tools
This guide covers the biggest challenges securing work-from-home tools and three actionable steps you can take to overcome them.
Contact Us
Contact Us
Whether you’re just starting to look or already have a budgeted project, we’d love to talk. Tell us a bit about you, and a real human will get in touch with you to set up a chat at your convenience. We look forward to speaking with you.
CHAT WITH US
I'm a customer and need...
Preparing for the CCRI Program
The Command Cyber Readiness Inspection (CCRI) Program is a comprehensive, formal inspection of cyber readiness compliance led by The Defense Information Systems Agency (DISA). This program focuses primarily on network security policies and programs managed by the local network provider to provide cyber awareness to senior leaders.
The CCRI program holds senior mission Commanders at major...
Department of Defense (DOD) Cybersecurity Compliance
Protecting the Department of Defense (DoD) community is a unique responsibility with unique compliance requirements across a wide variety of platforms and systems. A deep understanding of those requirements is a prerequisite for vendors seeking to support the DoD’s security initiatives and is critical to the success of its mission.
Tripwire has demonstrated its expertise in meeting DoD requirements for nearly two decades, helping over 500 DoD customers evolve as requirements evolve, achieve compliance, and improve cybersecurity. Tripwire compliance solutions cover over 2,000 federally-mandated security compliance OS combinations including NIST 800-53, FISMA, DISA STIGS, and others.
Based on recent work with DoD customers, Tripwire has identified three of the DoD’s top-of-mind compliance requirements that are presenting a variety of hurdles that few DoD partners have the expertise to help agencies overcome. If the following requirements have one thing in common, all three bring both tremendous challenge and promise to the DoD’s cybersecurity mission. Download your copy of the white paper to learn more.
Case Study
Major Healthcare Provider Enhances Vulnerability Management Program
Recognized as one of the top healthcare providers in the United States, this organization employs tens of thousands of professionals spread across nearly 500 locations. The provider wins frequent awards for the quality of its services and is regularly recognized for being among one of the highest-rated workplaces in the industry.
To further elevate the level of security around the vast volumes of...
Case Study
Payment Processor for Businesses
As a recognized leader in the payment processing sector, this company offers its clients hundreds of secure payment methods across multiple platforms, around the globe. Onan average day it processes tens of millions of mobile, online and in-store transactions in 100+ currencies.After experiencing a security incident that was quickly contained, the company took the opportunity to revamp its entire...
State of Iowa
IOWA MEETS SECURITY CHALLENGES WITH CRITICAL SECURITY CONTROLS AND VULNERABILITY MANAGEMENT (VM)With today’s growing and ever-changing threat landscape, the need for a strong cybersecurity initiative is apparent now more than ever. According to the 2014 US State of Cybercrime Survey conducted by PwC, “most organizations’ cybersecurity programs do not rival the persistence, tactical skills and...
Case Study
Tripwire helps Verifone ensure secure operations around the world
San Jose, California-based Verifone is a leading enabler of electronic payment transactions and point-of-sale services. With over 29 million devices and terminals deployed across more than 150 countries, Verifone’s clients include some of the world’s best- known retail brands, financial institutions and payment providers.Delivering the services necessary for Verifone’s employees to support the...
Datasheet
10 Ways Tripwire Outperforms Other Cybersecurity Solutions
As a security professional, you’re tasked with protecting your organization against attacks, detecting threats, identifying vulnerabilities and hardening configurations. But in an increasingly crowded marketplace, how do you choose the right cybersecurity partner? From experience and technical innovation to security expertise, Fortra's Tripwire stands out from the competition.Here are 10 reasons...