Cimcor New

When is PCI Required? (+ 4 Tips for Maintainig Compliance)
Payment card data is the most commonly targeted information by cybercriminals. Keeping your customers' payment card information safe is a top priority as cyber threats become more sophisticated and advanced. That's where ...

Exploring the SEC’s New Cybersecurity Risk Management and Incident Disclosure Rules (Part 2)
Navigating the SEC's Cybersecurity Rules and the Crucial Role of Integrity in Cybersecurity Threats and Incidents (Part 2 of 4) As cyber threats grow in sophistication and frequency, regulators are stepping up ...

Exploring the SEC’s New Cybersecurity Risk Management and Incident Disclosure Rules (Part 1)
Exploring the SEC's New Cybersecurity Risk Management and Incident Disclosure Rules: Enhancing Investor Confidence (Part 1 of 4) In an increasingly digitized world, where businesses rely heavily on technology and data to ...

Understanding the Microsoft Hack and CimTrak’s Critical Role in Defense
As a cybersecurity professional, it's crucial to shed some light on the under-reported news of the recent Microsoft hack. On July 11thMicrosoft and CISA revealed a security incident that impacted several Exchange ...

SEC Cybersecurity Ruling – What to Know and How to Prepare
On July 26, 2023, the Securities and Exchange Commission (SEC) voted to adopt new rules on cybersecurity disclosures for publicly traded companies. This ruling has significant implications for public companies and their ...

Paradigm Shift Needed for Cybersecurity: Prioritizing Detection Over Response
The field of cybersecurity is facing a critical challenge that demands a paradigm shift in how we approach security. In a recent cybersecurity article by Renee Duddly of ProPublica titled "At What ...

What is a Cloud Workload Protection Platform (CWPP)?
As businesses become more dependent on the cloud, naturally, new security challenges will arise. ...

The Comprehensive Guide to File Integrity Monitoring
In order to understand Next-Gen File Integrity Monitoring (NGFIM), we must take a quick peek at the history and origin of File Integrity Monitoring (FIM). FIM has remained unchanged by way of ...

Cybercrime Predictions from an Industry Veteran: Dan Schaupner
Predicting the future of cybercrime has never been easy ...

Cybercrime Predictions from an Industry Veteran: Dr. Chase Cunningham
Cybersecurity—and particularly cybercrime—has always been a volatile field ...