Skip to content ↓ | Skip to navigation ↓

On Thursday, April 17, 2014, Tripwire conducted a webinar titled Heartbleed Outpatient Care: Steps for Secure Business Recovery (click link for webcast recording). We had such a tremendous response and attendance at this webinar, as demand has been high for more information.

We also had a very strong Q & A period and will be posting a number of the many questions that came in with written answers for your further review. Two polls were conducted, and here are the results of those inquiries, and some further commentary by those of us who provided the webinar. We appreciate all of you who participated.


Though 65% had used some sort of tool to detect Heartbleed vulnerabilities, we were surprised that approximately one-third of the participants had not used anything at all – a full 10 days since the vulnerability was announced to the public.

Questions at the end also highlighted these related finds:

a)  High interest expressed in running SecureScan (it must be the scanning 100 IPs for free feature that is so appealing?)

b)  For those of you who attended and are customers, a lot of interest to find where you could access Heartbleed rules and content for both Tripwire Enterprise and Tripwire Log Center, as well as the ASPL for Tripwire IP360.


After 10 days of Heartbleed in the marketplace, we were also surprised that over half of you (56%) either had been affected or did not know. The 43% of you who said you believe you had not been affected we now wonder about, especially since such a vast amount of the internet, services, applications, and devices were running a vulnerable version of OpenSSL.

We will be publishing all the questions asked with answers for your further edification. Thanks again for joining us, and if you’d like to comment further on the polls, or on the posted questions please add your commentary publicly here.


Related Articles:



picCheck out Tripwire SecureScan™, a free, cloud-based vulnerability management service  for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Heartbleed vulnerability.


picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].


Title image courtesy of ShutterStock