Cimcor Blog

Podcast: Which is a Greater Cybersecurity Threat: Rogue Hackers or Nation States?
Podcast: Which is a Greater Cybersecurity Threat: Rogue Hackers or Nation States?
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Michael A. Echols, CEO of...
CMMC: The New Cybersecurity Standard for Defense Contractors
CMMC: The New Cybersecurity Standard for Defense Contractors
In one of the biggest compliance shake-ups in a decade, the Department of Defense(DoD) has replaced its  self-assessment model with one of the most...
Winning the Trust of Customers and Partners with SOC 2 Compliance
Winning the Trust of Customers and Partners with SOC 2 Compliance
As security programs have matured, organizations have paid closer attention to the security of vendors and partners. Known as ‘supply chain risk’,...
Going Beyond Technology With CIS Organizational Controls
Going Beyond Technology With CIS Organizational Controls
 
What to Expect with Brazil's Data Protection Law 
What to Expect with Brazil's Data Protection Law 
Passed by the National Congress of Brazil in 2019, the Brazilian General Data Protection Law(Lei Geral de Protecao de Dados or LGPD) is slated to...
Breaking Down CIS Foundational Controls
Breaking Down CIS Foundational Controls
Effective cybersecurity programs many times utilize a layered approach. Spending a vast sum on advanced protection systems can be pointless if the...
Preventing Cyber Attacks With CIS Basic Controls
Preventing Cyber Attacks With CIS Basic Controls
Enterprise-level organizations have access to a vast range of security tools, resources, standards, and advice. Utilizing free and paid threat feeds,...
Podcast: Mitigating Zero Day Threats
Podcast: Mitigating Zero Day Threats
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
CIS Security Controls: What Are They and Should You Use Them?
CIS Security Controls: What Are They and Should You Use Them?
Cybersecurity is a huge field, and one that may feel as if it can never be ‘completed’ by many within information security, but this doesn't have to...
Enhancing SIEM Data with File Integrity Monitoring
Enhancing SIEM Data with File Integrity Monitoring
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...