The Role of Change Management in Cybersecurity

Change is the nemesis of IT and cybersecurity professionals who need to maintain a secure and available environment. No matter how secure your environment is, a single bad change is all it takes to open the door to a bad actor ... Read More

The Number One Compliance Problem Not Talked About

Cybersecurity teams are subject to a complicated web of compliance and regulatory frameworks ... Read More

Rethinking Cybersecurity: Working from a Trusted Baseline

The cybersecurity market has hundreds or thousands of vendors competing for budget, all with different solutions to different perceived problems ... Read More

What Cybersecurity Can Learn from IT

Historically, there has been plenty of negativity and friction between IT and cybersecurity teams. Security teams can be seen as ‘blockers’ that prevent IT from implementing positive changes for the organization. Meanwhile, security teams often feel like their IT operations counterparts just aren’t interested in protecting the organization from outside ... Read More

Top 3 Reasons Security and Compliance Are Going The Wrong Way

|
There’s a fundamental truth in the cybersecurity industry that nobody wants to face. Despite cybersecurity budgets and spending ballooning by the year, outcomes aren’t improving. In fact, they’re getting worse. In 2011, the cybersecurity market was valued at around $60 billion in annual spending. By the end of 2021, it’s ... Read More

Top 20 Problems FIM Can Help Solve Part 2

In part two of this three-part series, we discuss the pressure CIOs and CISOs face under the umbrella of security and compliance. File Integrity Monitoring (FIM) helps address and many times solve common IT security and compliance matters including but not limited to budgetary constraints, maintaining continuous verification and attestation ... Read More

More Problems FIM Helps Solve

In part two of this three-part series, we discuss the pressure CIOs and CISOs face under the umbrella of security and compliance. File Integrity Monitoring (FIM) helps address and many times solve common IT security and compliance matters including but not limited to budgetary constraints, maintaining continuous verification and attestation ... Read More

Top 20 Problems FIM Can Help Solve Part 1

CIOs and CISOs are under constant barrage and pressure to deliver more with fewer resources and less capital, all while continuing to meet any number of regulatory requirements.  ... Read More

Securing Active Directory

DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine,  Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on Securing Active Directory in today's cybersecurity climate. The podcast can be listened to in its entirety below ... Read More

Securing SCADA and ICS

DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine,  Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on SCADA & Industrial Control Systems in today's cybersecurity climate. The podcast can be listened to in its entirety below ... Read More