Cimcor Blog

Going Beyond Technology With CIS Organizational Controls
Going Beyond Technology With CIS Organizational Controls
 
What to Expect with Brazil's Data Protection Law 
What to Expect with Brazil's Data Protection Law 
Passed by the National Congress of Brazil in 2019, the Brazilian General Data Protection Law(Lei Geral de Protecao de Dados or LGPD) is slated to...
Breaking Down CIS Foundational Controls
Breaking Down CIS Foundational Controls
Effective cybersecurity programs many times utilize a layered approach. Spending a vast sum on advanced protection systems can be pointless if the...
Preventing Cyber Attacks With CIS Basic Controls
Preventing Cyber Attacks With CIS Basic Controls
Enterprise-level organizations have access to a vast range of security tools, resources, standards, and advice. Utilizing free and paid threat feeds,...
Podcast: Mitigating Zero Day Threats
Podcast: Mitigating Zero Day Threats
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
CIS Security Controls: What Are They and Should You Use Them?
CIS Security Controls: What Are They and Should You Use Them?
Cybersecurity is a huge field, and one that may feel as if it can never be ‘completed’ by many within information security, but this doesn't have to...
Enhancing SIEM Data with File Integrity Monitoring
Enhancing SIEM Data with File Integrity Monitoring
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Applying CIS Benchmarks to Boost Security, Integrity, and Compliance
Applying CIS Benchmarks to Boost Security, Integrity, and Compliance
Secure configuration is the foundation of cybersecurity and compliance, and as previously discussed, CIS benchmarks are the accepted best practice.
How To Reduce Your Attack Surface with System Hardening
How To Reduce Your Attack Surface with System Hardening
In most instances, new digital assets, such as servers and operating systems, come in an unconfigured state. When an asset is installed, everything...
Podcast: Are all FIMs Created Equal?
Podcast: Are all FIMs Created Equal?
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...