Tripwire.com uses cookies for analytics and functionality purposes.To change your cookie settings or find out more, click here. If you continue browsing our website or close this banner, you accept these cookies.

Tripwire Assets & Resources

Filter resources by product, type or topic:

White Paper:

Adjusting to the Reality of RMF

The Risk Management Framework (RMF) is an approach to systems security management that adjusts security controls based on risk factors. The practice involves a continuous cycle of identifying new threats, choosing effective controls, measuring their effectiveness and improving system security.

Solution Brief:

PSN Code of Connection – GPG13

UK Public Sector organizations are mandated to comply with certain regulations and standards before connecting to the Government’s Secure Extranet. CESG (the Information Security arm of GCHQ), and the National Technical Authority for Information Assurance documented 35 Good Practice Guides to help public sector organizations manage risk.

Solution Brief:

Tripwire and HITRUST

The HITRUST CSF helps healthcare organizations comply with various standards like NIST, CIS, HIPAA by providing a single overarching framework. Now, with Tripwire Enterprise, organizations can automate the HITRUST CSF and reduce the burden of compliance.

Solution Brief:

Tripwire Solutions for Healthcare Organizations

Healthcare organizations hold patient data that's extremely valuable on the black market, making them prime targets for cybercriminals. The advent of Internet-connected medical devices has done nothing but increase the attack surface of these organizations, while at the same time they struggle to comply with a multitude of changing regulations.

Solution Brief:

Security and Compliance for Healthcare Exchanges: Addressing MARS-E 2.0

Medical organizations, insurance companies and state healthcare agencies have seen a dramatic increase in breaches—the top 2015 breaches involved insurance companies, a medical facility and a state agency. This is due to the rich information contained in medical records—information that can be used for profitable health care fraud as well as all the traditional scams that stolen data can power.

White Paper:

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.

Solution Brief:

Banking on Cyber Integrity

For any bank to succeed, building customer trust is paramount. Threat actors’ cyberattack strategies are becoming increasingly innovative, putting urgent pressure on banks to protect their data or make the headlines when the next big breach takes place.

Infographic:

Are Financial Services IT Pros Overconfident in Data Breach Detection Skills?

Tripwire studied confidence vs. knowledge of financial services IT security pros on seven key security controls necessary to detect a data breach. For many controls IT pros believed they had the information necessary to detect a breach quickly but provided contradictory information about the specific data.

Solution Brief:

Unified Security Solutions for Financial Services

When you ask consumers what they expect from financial institutions, trust (including personal information and privacy) is at the top of the list. The stakes are high, so creating successful, integrated cyberdefenses are critical. Download this solution brief to learn why traditional security approaches are not effective—and how Tripwire solutions help reduce the cyber security threat gap, prevent breaches, detect attacks in real time and minimize damage if and when a breach occurs.

Solution Brief:

23 NYCCR 500 and Tripwire Solutions

Video:

Advanced Analytics to Attain Risk Insights and Reduce Threat

Enterprises are dealing with “it’s not a matter of if you will be breached but a matter of when.” Executives are taking an increased interest in the organization’s security posture and the impact on business goals and objectives. Their job depends on it. Because of this, there is a need to quickly detect, prioritize and remediate information technology risks.

Datasheet:

Tripwire and Soltra: Monitoring for Peer and Community-Sourced Indicators of Compromise

STIX and TAXII have recently been emerging as the standard for sharing threat intelligence. The adoption of these standards has been driven in large part by FS-ISAC, which has been a leader in promoting the value of automated threat intelligence sharing amongst its member organizations.