Managing Your Assets with Tripwire Enterprise

Asset management is a tricky subject. In many cases, organizations have no idea about how many assets they have, let alone where they are all located.  Fortunately, there are tools that can assist with reaching your asset management goals. While Tripwi… Continue reading Managing Your Assets with Tripwire Enterprise

Cloud Security: Messy Blobs and Leaky Buckets

Moving to the cloud means a lot more than just moving your servers and applications to the cloud; it’s also about the data – and data always has a target on it. A lot of IT departments are finding that it’s easier to meet the “five nines” (99.999%) of … Continue reading Cloud Security: Messy Blobs and Leaky Buckets

The Center for Internet Security (CIS) Use Cases and Cost Justification

Vince Lombardi, the famous football coach, used to start his training camp each season with a talk about doing the basics. He’d tell the players that they start with the basics, then he’d take a football and hold it up and tell them, &#8220… Continue reading The Center for Internet Security (CIS) Use Cases and Cost Justification

Best Practices for Using Tripwire Enterprise in Dynamic Environments – Part 2

In my previous article, we discussed how organizations are shifting how IT resources are deployed and managed. We covered three methods in particular: automated image creation and deployment, immutable image deployment and containers. We’ll now e… Continue reading Best Practices for Using Tripwire Enterprise in Dynamic Environments – Part 2

Best Practices for Using Tripwire Enterprise in Dynamic Environments – Part 1

Just a few years ago, most IT environments were made up of deployed servers on which personnel installed applications, oftentimes as many as that one system could handle. They then remained and ran that way for years. In the meantime, the IT team maint… Continue reading Best Practices for Using Tripwire Enterprise in Dynamic Environments – Part 1

A ‘How To’ for Asset Tagging

The systems in your environment are extremely important assets. Storing intellectual property, customer information, financial information, business automation, etc. If any of these systems are breached or become unavailable, there is a business and fi… Continue reading A ‘How To’ for Asset Tagging

Do Your On-Prem Controls Extend into the Cloud?

There’s a Russian proverb “overyai, no proveryai.” (Trust, but verify.) You trust your IT department to keep your systems up and running and configured in a secure manner.  But, do you verify those configurations? As we all … Continue reading Do Your On-Prem Controls Extend into the Cloud?