Remember a Polaroid? Why This Matters and How Tripwire Keeps this Tradition Alive

We’re going to talk about state versus change. For the purposes of our discussion, you need to know that Tripwire Enterprise offers something called TE Commander. Many enterprise applications lack a native command line interface. This can be a challeng… Continue reading Remember a Polaroid? Why This Matters and How Tripwire Keeps this Tradition Alive

Integrity: How It’s More than Just Data Security and FIM

Integrity is a word thrown around a lot in the cybersecurity space. That’s not surprising. It is one of the three components that make up the CIA Triad, after all. However, the meaning and use of the word has been relatively limited in many security ci… Continue reading Integrity: How It’s More than Just Data Security and FIM

Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)

File integrity monitoring (FIM) started back in 1997 when Gene Kim launched Tripwire and its “Change Audit” solution. Just a few years later, Change Audit became FIM; this rebranded tool worked with the 12 security controls identified in Vi… Continue reading Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)

Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)

File integrity monitoring (FIM) started back in 1997 when Gene Kim launched Tripwire and its “Change Audit” solution. Just a few years later, Change Audit became FIM; this rebranded tool worked with the 12 security controls identified in Vi… Continue reading Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)

Tripwire Enterprise and Zero Trust

Zero Trust is a new concept to many but one I believe will be of increasing importance over the coming years. With this post, I wanted to introduce newcomers to the concept, talk about why it’s an exciting approach to improving security, and expl… Continue reading Tripwire Enterprise and Zero Trust

What Does Integrity Monitoring Have To Do With Security Anyway?

After spending several decades in this industry, I have seen growth in many different security products and in many different areas. All the while, I’ve questioned whether specific technologies were offering real value or were just over-marketed … Continue reading What Does Integrity Monitoring Have To Do With Security Anyway?

Turning Malware Trends into Proactive Behaviors

Most of the industry agrees: malware is on the rise. My news feed rarely manages a week without an incident making the headlines. Here are some of the most recent events I’ve seen: Online retailer Newegg suffered a data breach at the hands of the… Continue reading Turning Malware Trends into Proactive Behaviors

Making Continuous HIPAA Compliance Easy with ExpertOps

Healthcare organizations continue to face relentless cyberattacks owing to the immense value placed on patient health information on the dark web. Patient records have almost everything the attacker needs to carry out sophisticated insurance fraud sche… Continue reading Making Continuous HIPAA Compliance Easy with ExpertOps