FIM
SCM: Understanding Its Place in Your Organization’s Digital Security Strategy
Digital attackers can compromise a system in a matter of minutes. But it generally takes organizations much longer to figure out that anything has happened. In its 2020 Data Breach Investigations Report ...
Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)
File integrity monitoring (FIM) started back in 1997 when Gene Kim launched Tripwire and its “Change Audit” solution. Just a few years later, Change Audit became FIM; this rebranded tool worked with ...
Change Is Inevitable: Tripwire File Analyzer
One of the only things that is constant in life is change. It’s the same with cybersecurity. There are different types of changes to consider. Changes that we accept Changes that are ...
Tripwire Enterprise and Zero Trust
Zero Trust is a new concept to many but one I believe will be of increasing importance over the coming years. With this post, I wanted to introduce newcomers to the concept, ...
What Does Integrity Monitoring Have To Do With Security Anyway?
After spending several decades in this industry, I have seen growth in many different security products and in many different areas. All the while, I’ve questioned whether specific technologies were offering real ...
What Is FIM (File Integrity Monitoring)?
File integrity monitoring (FIM) exists because change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur ...
Turning Malware Trends into Proactive Behaviors
Most of the industry agrees: malware is on the rise. My news feed rarely manages a week without an incident making the headlines. Here are some of the most recent events I’ve ...
Making Continuous HIPAA Compliance Easy with ExpertOps
Healthcare organizations continue to face relentless cyberattacks owing to the immense value placed on patient health information on the dark web. Patient records have almost everything the attacker needs to carry out ...
2 Strategies to Tighten Your Cloud Security
Creating a thorough and effective security program is difficult enough when your data is stored on-premises. But most organizations and agencies straddle hybridized on-prem and cloud environments—or they’re cloud-native entirely. This complicates ...
What Is Integrity Management?
If you’ve been in information security for a while, you’ve likely had some experience with file integrity monitoring (FIM). It’s a capability with a long history, going back to the original open-source ...

