FIM and System Hardening: Block & Detect Cyberthreats in Windows
Register for our webinar on April 12th to discover how… Continue reading FIM and System Hardening: Block & Detect Cyberthreats in Windows
Collaborate Disseminate
Register for our webinar on April 12th to discover how… Continue reading FIM and System Hardening: Block & Detect Cyberthreats in Windows
In part two of this three-part series, we discuss the pressure CIOs and CISOs face under the umbrella of security and compliance. File Integrity Monitoring (FIM) helps address and many times solve common IT security and compliance matters includi… Continue reading Top 20 Problems FIM Can Help Solve Part 2
CIOs and CISOs are under constant barrage and pressure to deliver more with fewer resources and less capital, all while continuing to meet any number of regulatory requirements.
The post Top 20 Problems FIM Can Help Solve Part 1 appeared first … Continue reading Top 20 Problems FIM Can Help Solve Part 1
As we know, Tripwire Enterprise (TE) is the de-facto go-to solution for File Integrity Monitoring (FIM). In normal operations, we deploy a TE agent to a system we want to monitor. TE then uses that agent to baseline the system against the appropriate r… Continue reading Agentless Monitoring with Tripwire Enterprise: What You Need to Know
Lateral movement is one of the most consequential types of network activity for which organizations need to be on the lookout. After arriving at the network, the attacker keeps ongoing access by essentially stirring through the compromised environment … Continue reading File Integrity Monitoring (FIM): Your Friendly Network Detective Control
DATA SECURITY PODCAST
In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor CEO/President discusses the latest views on data security, and the importance of system integrity monitor… Continue reading Analyzing SIEM Data with Integrity Monitoring
We all know there are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need… Continue reading What Security Leaders Should Consider When Building a Business Case for Integrity Monitoring
File integrity monitoring (FIM) started back in 1997 when Gene Kim launched Tripwire and its “Change Audit” solution. Just a few years later, Change Audit became FIM; this rebranded tool worked with the 12 security controls identified in Vi… Continue reading Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)
File integrity monitoring (FIM) started back in 1997 when Gene Kim launched Tripwire and its “Change Audit” solution. Just a few years later, Change Audit became FIM; this rebranded tool worked with the 12 security controls identified in Vi… Continue reading Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)
Zero Trust is a new concept to many but one I believe will be of increasing importance over the coming years. With this post, I wanted to introduce newcomers to the concept, talk about why it’s an exciting approach to improving security, and expl… Continue reading Tripwire Enterprise and Zero Trust