TE - Tripwire Enterprise 300

Tripwire Products: Quick Reference Guide

Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today, we’d like to offer a straight-forward ...

Rooted in Security Basics: The Four Pillars of Cyber Hygiene

The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to ...

Defending our Digital Homeland: Preventive Control Is Only The Beginning

Sir Winston Churchill spoke of fighting wherever and whenever to defend the homeland. The battle we face now in securing networks requires that same broad approach of defending and fighting everywhere we ...

Log Management for Government Agencies: What You Need to Know

Without a doubt, log management should be part of the core of any IT security platform of a government agency. It has a role in not only security but also in operations ...

What Is Passive Asset Discovery, and Is It That Important?

Let’s first talk about asset discovery in general and why it is useful, even critical, to most organisations. What Is Asset Discovery? Asset discovery is the ability to provide visibility of all ...

20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs

Today, I will be going over Control 6 from version 7 of the CIS top 20 Critical Security Controls – Maintenance, Monitoring, and Analysis of Audit Logs. I will go through the ...