News
4/10/2014
08:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tripwire Donates $11.75M Cybersecurity Service to Penn State

Gift is a cloud-based risk and analytics cybersecurity service to the Center for Cyber Security, Information Privacy and Trust.

PORTLAND, OREGON April 10, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced a gift of a  cloud-based risk and analytics cybersecurity service to the Center for Cyber Security, Information Privacy and Trust at Penn State’s College of Information Sciences and Technology

The non-exclusive license grant provides a license to Tripwire® Benchmark, a cloud-based risk and analytics cybersecurity service. Penn State has valued the technology at $11.75 million, and it is the single largest contribution the College of IST has received to date.

“This very significant gift provides unique opportunities for the College of IST for research, education and outreach,” said Dr. David Hall, dean of the College of Information Sciences and Technology. “Our research in cyber security, big data analytics and discovery, and human-computer interaction match very well with Tripwire’s evolving database and toolkit. We will be able to use this gift in classroom exercises and in the curricula for our undergraduate Security and Risk Analysis (SRA) major and graduate program in Cyber Security and Information Assurance. We are very thankful for Tripwire’s generosity and will display the gift prominently in the IST Building’s new laboratory.”   

Tripwire selected Penn State for this donation to further the education of future cybersecurity leaders as well as develop a community of experts that share information and analytics unavailable from other sources. The free service will help address the serious economic and national security issues presented by cybersecurity risks. 

“We’re excited about our partnership with Penn State’s College of IST,” said Rod Murchison, vice president of product management for Tripwire and Penn State alumnus. “Our goal is to support their renowned security and risk analysis program and help mold the next generation of cybersecurity leaders. In addition, this donation has the potential to have an enduring and positive impact on today’s cybersecurity professionals by providing the kind of industry analytics necessary to maximize the value of existing security investments.”

The growing national focus on information assurance and cybersecurity and a worldwide shortage of information security experts has organizations of every size looking for objective, transparent analytics that can accurately assess risk and maximize the effectiveness of security and compliance investments.  The new Penn State service is designed to deliver security performance metrics, scorecards and analytics that help organizations worldwide do the following:

· Build risk-based security and compliance management programs based on objective, fact-based metrics.

· Prove that existing security investments and resources are protecting the organization as well as identify areas of weakness that need additional investment.

· Benchmark security performance against internal goals and industry peers.

· Trend risk-based security performance metrics over time.

The grant will also be used by Penn State for additional cybersecurity research and the development of new metrics.

Penn State's College of IST is a leader in cybersecurity risk analysis and has been designated a National Center of Academic Excellence in Information Assurance Education by the National Security Agency and the Department of Homeland Security. The unique, interdisciplinary security and risk analysis programs at Penn State are designed to teach students how to secure systems, evaluate and measure risk, and ensure proper levels of privacy protection.

The free Penn State security analytics cloud service is available today to any organization that would like to measure the effectiveness of their IT security investments. For more information and access to security and risk metrics, scorecards, and benchmarks please visit https://benchmark.ist.psu.edu/.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.