How to Combat Asset Blindness in OT Security

One of the main challenges of OT security is the problem of compatibility. OT components often differ significantly from each other in terms of age and sophistication as well as software and ...

The Challenge of Asset Tracking in Industrial Environments

Asset inventory is a significant part of a comprehensive security plan for all organizations.  After all, if you do not know what assets you have, then you cannot manage them.  Even a ...

CIS Control 2: Inventory and Control of Software Assets

Today, I will be going over CIS Control 2 from version 8 of the top 18 CIS Controls – Inventory and Control of Software Assets. Version 7 of CIS Controls had 10 ...

What is Asset Discovery? A Look Beneath the Surface

The corporate network can be a busy place with devices connecting, reconnecting and disconnecting every day. With the ever-growing landscape of today’s corporate networks, the difficulty of knowing and understanding what is ...

Asset Discovery with Chris Kirsch Co-Founder at Rumble

Chris Kirsch co-founder and chief revenue officer at Rumble joins us in our June monthly show to talk about how Rumble is solving the problem of asset discovery. You also get to ...

Realizing Hybrid Asset Discovery with Tripwire Industrial Appliance

Digital attacks continue to weigh on the minds of industrial cybersecurity (ICS) professionals. In a 2019 survey, 88% of ICS experts told Tripwire they were worried about what a digital attack could ...

Why Asset Visibility Is Essential to the Security of Your Industrial Environment

Threats against industrial environments are on the rise. Near the beginning of 2019, for example, Kaspersky Lab revealed that 47% of industrial control system (ICS) computers on which its software was installed ...

Vulnerability Management Program Best Practices

An enterprise vulnerability management program can reach its full potential when it is built on well-established foundational goals that address the information needs of all stakeholders, when its output is tied back ...
cybersecurity startups

3 Steps to Controlling Access Inside the Network

As traffic on the network increases, so do potential vulnerabilities. Network access should be managed more tightly to keep data secure. For years, IT security has been focused primarily on defending the ...
Security Boulevard

Is Poor Security Worse Than No Security?

As Lead Systems Engineer (EMEA) at Tripwire, I’ve had the pleasure of sitting down with and talking to many prospective customers about their security needs. I always ask about their existing digital ...