Alert: New DLL Variant Used For Malicious Code Execution

Recent research findings have brought to light a new DLL variant pertaining to search order hijacking techniques. As per recent reports, this dynamic link library variant could potentially be used by threat ...
A Security Leader's Guide to Implementing System Hardening

A Security Leader’s Guide to Implementing System Hardening

| | system hardening
System hardening is fundamental to effective cybersecurity. Without a controlled, securely configured environment, there is simply no way to successfully manage IT security risks. But while the concept is undoubtedly simple, its ...
What is System Hardening: An Introduction

What is System Hardening: An Introduction

| | system hardening
Everybody loves a flashy tool. With AI-frenzy sweeping the industry, the already-excessive hype of the cybersecurity industry has gone into overdrive. Every vendor in sight is talking endlessly about how generative AI ...
The Value of System Hardening

The Value of System Hardening

In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses the overall value that implementing system hardening paired with a configuration management ...
System Hardening Best Practices

System Hardening Best Practices

| | Podcast, system hardening
In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses system hardening best practices - and how to get started. The podcast ...
Do Hardened Systems Need FIM?

Do Hardened Systems Need FIM?

In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, addresses whether it is necessary for already hardened systems to utilize file integrity ...

Podcast: The Buzz Around System Hardening

| | Podcast, system hardening
In a recent podcast interview with Zack Hack, Host of Cybercrime Magazine,  Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on system hardening and why it's important. The podcast can ...

System Hardening with DISA STIGs and CIS Benchmarks

In the past, the cybersecurity industry paid the most attention to technologies that either block threats or help organizations recover from them. These are solutions like firewalls, antivirus, and EDRs, which help ...

How To Reduce Your Attack Surface

In most instances, new digital assets, such as servers and operating systems, come in an unconfigured state. When an asset is installed, everything is enabled by default. All application services are turned ...

What Are CIS Benchmarks? 7 Things You Need For Security and Compliance

The cybersecurity industry gives a lot of attention to protective solutions like firewalls and EDRs. Though these technologies are important for a powerful security program, over-focusing on these solutions can lead some ...