News
4/10/2014
08:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tripwire Donates $11.75M Cybersecurity Service to Penn State

Gift is a cloud-based risk and analytics cybersecurity service to the Center for Cyber Security, Information Privacy and Trust.

PORTLAND, OREGON April 10, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced a gift of a  cloud-based risk and analytics cybersecurity service to the Center for Cyber Security, Information Privacy and Trust at Penn State’s College of Information Sciences and Technology

The non-exclusive license grant provides a license to Tripwire® Benchmark, a cloud-based risk and analytics cybersecurity service. Penn State has valued the technology at $11.75 million, and it is the single largest contribution the College of IST has received to date.

“This very significant gift provides unique opportunities for the College of IST for research, education and outreach,” said Dr. David Hall, dean of the College of Information Sciences and Technology. “Our research in cyber security, big data analytics and discovery, and human-computer interaction match very well with Tripwire’s evolving database and toolkit. We will be able to use this gift in classroom exercises and in the curricula for our undergraduate Security and Risk Analysis (SRA) major and graduate program in Cyber Security and Information Assurance. We are very thankful for Tripwire’s generosity and will display the gift prominently in the IST Building’s new laboratory.”   

Tripwire selected Penn State for this donation to further the education of future cybersecurity leaders as well as develop a community of experts that share information and analytics unavailable from other sources. The free service will help address the serious economic and national security issues presented by cybersecurity risks. 

“We’re excited about our partnership with Penn State’s College of IST,” said Rod Murchison, vice president of product management for Tripwire and Penn State alumnus. “Our goal is to support their renowned security and risk analysis program and help mold the next generation of cybersecurity leaders. In addition, this donation has the potential to have an enduring and positive impact on today’s cybersecurity professionals by providing the kind of industry analytics necessary to maximize the value of existing security investments.”

The growing national focus on information assurance and cybersecurity and a worldwide shortage of information security experts has organizations of every size looking for objective, transparent analytics that can accurately assess risk and maximize the effectiveness of security and compliance investments.  The new Penn State service is designed to deliver security performance metrics, scorecards and analytics that help organizations worldwide do the following:

· Build risk-based security and compliance management programs based on objective, fact-based metrics.

· Prove that existing security investments and resources are protecting the organization as well as identify areas of weakness that need additional investment.

· Benchmark security performance against internal goals and industry peers.

· Trend risk-based security performance metrics over time.

The grant will also be used by Penn State for additional cybersecurity research and the development of new metrics.

Penn State's College of IST is a leader in cybersecurity risk analysis and has been designated a National Center of Academic Excellence in Information Assurance Education by the National Security Agency and the Department of Homeland Security. The unique, interdisciplinary security and risk analysis programs at Penn State are designed to teach students how to secure systems, evaluate and measure risk, and ensure proper levels of privacy protection.

The free Penn State security analytics cloud service is available today to any organization that would like to measure the effectiveness of their IT security investments. For more information and access to security and risk metrics, scorecards, and benchmarks please visit https://benchmark.ist.psu.edu/.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.