Welcome!

Containers Expo Blog Authors: Pat Romanski, Yeshim Deniz, Elizabeth White, Liz McMillan, Zakia Bouachraoui

News Feed Item

Penn State’s Free Benchmark Cybersecurity Analytics Service Delivers New Vulnerability Management Insights

The College of Information Sciences and Technology at Penn State, in partnership with Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that the top 25 percent of vulnerability management contributors scanned their networks nearly continuously and had an average aggregate host risk score of 2.14 using the Common Vulnerability Scoring System (CVSS).

CVSS is an industry standard that measures the severity of vulnerabilities and prioritizes remediation efforts. CVSS scores range from zero to ten and vulnerabilities with a base score in the range of 7.0-10.0 are critical, 4.0-6.9 are major and 0-3.9 are minor.

Average host risk score, as well as average days since the last scan, are two key vulnerability management metrics derived from Penn State’s Benchmark, a free, cloud-based cybersecurity analytics service. Benchmark allows security professionals to collaborate on security best practices and compare their security performance against community and industry benchmarks.

“Average aggregate host risk score and average days since last scan are excellent indicators of vulnerability management performance because they tend to move in the same direction,” said Rod Murchison, vice president of product management at Tripwire. “Together, these scores indicate that companies that scan more frequently tend to have a more effective vulnerability remediation process, lowering their overall vulnerability risks scores.”

Vulnerability management is a foundational security control that proactively prevents the exploitation of IT vulnerabilities. As a leading cybersecurity program performance management indicator, vulnerability management is referenced in every major security standard, including the Payment Card Industry Data Security Standard (PCI DSS), the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity and the 20 Critical Security Controls (20 CSC). Proactive management of vulnerabilities dramatically reduces the potential of successful cyberattacks and improves risk posture.

“Benchmark is a great example of the type of tools we need to train the next generation of cybersecurity analysts, and that is precisely why we are integrating it into our undergraduate curriculum,” said Dr. David Hall, dean of the College of Information Sciences and Technology at Penn State. “Benchmark metrics help analysts take a qualitative approach to the capabilities of their cybersecurity infrastructure. Together, these metrics also make it possible for cybersecurity experts to evaluate the performance of their security controls at a higher level of abstraction.”

Tripwire donated its Benchmark service to the Center for Cyber Security, Information Privacy and Trust at Penn State’s College of Information Sciences and Technology in April. The free Penn State security analytics service is available today to any organization that would like to measure the effectiveness of their IT security investments. For more information and access to security and risk metrics, scorecards and benchmarks, please visit: https://benchmark.ist.psu.edu/.

About Tripwire

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.

About Penn State College of IST

The College of Information Sciences and Technology (IST) at The Pennsylvania State University in University Park, PA, is an interdisciplinary program started in 1998 that links computer science, users, and information technology. The College of IST offers an associate degree as well as bachelor of arts and bachelor of science degrees in IST and a bachelor of science in security and risk analysis (SRA) at 20 campuses throughout the commonwealth of Pennsylvania. Additionally, a resident, academic M.S. degree and Ph.D. degree in IST is also offered at the University Park campus. Online offerings include undergraduate degrees in IST and SRA, undergraduate and post baccalaureate certificates, and online MPS degrees in homeland security, information sciences, and enterprise architecture. For more information, visit http://ist.psu.edu.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
DXWorldEXPO LLC announced today that Ed Featherston has been named the "Tech Chair" of "FinTechEXPO - New York Blockchain Event" of CloudEXPO's 10-Year Anniversary Event which will take place on November 12-13, 2018 in New York City. CloudEXPO | DXWorldEXPO New York will present keynotes, general sessions, and more than 20 blockchain sessions by leading FinTech experts.
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy.
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...