Cimcor Blog

Podcast: Are all FIMs Created Equal?
Podcast: Are all FIMs Created Equal?
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Why CIS Benchmarks are Critical for Security and Compliance
Why CIS Benchmarks are Critical for Security and Compliance
The cybersecurity industry gives a lot of attention to protective solutions like firewalls and EDRs. And that makes sense. These technologies are...
System Integrity Monitoring Best Practices
System Integrity Monitoring Best Practices
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Security Frameworks and CIS Controls
Security Frameworks and CIS Controls
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
The Key to Security: Understanding System Integrity
The Key to Security: Understanding System Integrity
4 Ways to Improve Cybersecurity Posture
4 Ways to Improve Cybersecurity Posture
Cybersecurity threats present a growing and dynamic challenge for businesses of all sizes. Unfortunately, they are commonplace occurrences as Forbes...
Managing Vulnerabilities and Staying Compliant
Managing Vulnerabilities and Staying Compliant
Inadequate and ineffective technologies are often the culprit behind the failure of compliance mandates and initiatives for many organizations....
Cimcor Interview for Hot 150 Cybersecurity Companies
Cimcor Interview for Hot 150 Cybersecurity Companies
In a recent interview with Lakeshore Public Radio producer and host Chris Nolte, Robert E. Johnson III, shares his thoughts regarding Cimcor's...
4 Reasons Why Change Control is Necessary
4 Reasons Why Change Control is Necessary
Change Control and Change management are not just buzzwords. Though many organizations tend to think of change control as more of a concept, in...
Top 5 Network Security Risks and Threats
Top 5 Network Security Risks and Threats
It’s an unpleasant truth that businesses must face: Between vulnerabilities and the ever-changing IT landscape, network security risks continue to...