The Role of Change Management in Cybersecurity
Change is the nemesis of IT and cybersecurity professionals who need to maintain a secure and available environment. No matter how secure your environment is, a single bad change is all it takes to open the door to a bad actor ... Read More
The Number One Compliance Problem Not Talked About
Cybersecurity teams are subject to a complicated web of compliance and regulatory frameworks ... Read More
Rethinking Cybersecurity: Working from a Trusted Baseline
The cybersecurity market has hundreds or thousands of vendors competing for budget, all with different solutions to different perceived problems ... Read More
What Cybersecurity Can Learn from IT
Historically, there has been plenty of negativity and friction between IT and cybersecurity teams. Security teams can be seen as ‘blockers’ that prevent IT from implementing positive changes for the organization. Meanwhile, security teams often feel like their IT operations counterparts just aren’t interested in protecting the organization from outside ... Read More
Top 3 Reasons Security and Compliance Are Going The Wrong Way
There’s a fundamental truth in the cybersecurity industry that nobody wants to face. Despite cybersecurity budgets and spending ballooning by the year, outcomes aren’t improving. In fact, they’re getting worse. In 2011, the cybersecurity market was valued at around $60 billion in annual spending. By the end of 2021, it’s ... Read More
Top 20 Problems FIM Can Help Solve Part 2
In part two of this three-part series, we discuss the pressure CIOs and CISOs face under the umbrella of security and compliance. File Integrity Monitoring (FIM) helps address and many times solve common IT security and compliance matters including but not limited to budgetary constraints, maintaining continuous verification and attestation ... Read More
More Problems FIM Helps Solve
In part two of this three-part series, we discuss the pressure CIOs and CISOs face under the umbrella of security and compliance. File Integrity Monitoring (FIM) helps address and many times solve common IT security and compliance matters including but not limited to budgetary constraints, maintaining continuous verification and attestation ... Read More
Top 20 Problems FIM Can Help Solve Part 1
CIOs and CISOs are under constant barrage and pressure to deliver more with fewer resources and less capital, all while continuing to meet any number of regulatory requirements. ... Read More
Securing Active Directory
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on Securing Active Directory in today's cybersecurity climate. The podcast can be listened to in its entirety below ... Read More
Securing SCADA and ICS
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on SCADA & Industrial Control Systems in today's cybersecurity climate. The podcast can be listened to in its entirety below ... Read More