Cimcor Blog

Jacqueline von Ogden

Since 1999, Jacqueline has written for corporate communications, MarCom agencies, higher education, and worked within the pharmacy, steel and retail industries. Since joining the tech industry, she has found her "home".

Preventing Cyber Attacks With CIS Basic Controls
Preventing Cyber Attacks With CIS Basic Controls
Enterprise-level organizations have access to a vast range of security tools, resources, standards, and advice. Utilizing free and paid threat feeds,...
Podcast: Mitigating Zero Day Threats
Podcast: Mitigating Zero Day Threats
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
CIS Security Controls: What Are They and Should You Use Them?
CIS Security Controls: What Are They and Should You Use Them?
Cybersecurity is a huge field, and one that may feel as if it can never be ‘completed’ by many within information security, but this doesn't have to...
Enhancing SIEM Data with File Integrity Monitoring
Enhancing SIEM Data with File Integrity Monitoring
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Applying CIS Benchmarks to Boost Security, Integrity, and Compliance
Applying CIS Benchmarks to Boost Security, Integrity, and Compliance
Secure configuration is the foundation of cybersecurity and compliance, and as previously discussed, CIS benchmarks are the accepted best practice.
How To Reduce Your Attack Surface with System Hardening
How To Reduce Your Attack Surface with System Hardening
In most instances, new digital assets, such as servers and operating systems, come in an unconfigured state. When an asset is installed, everything...
Podcast: Are all FIMs Created Equal?
Podcast: Are all FIMs Created Equal?
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Why CIS Benchmarks are Critical for Security and Compliance
Why CIS Benchmarks are Critical for Security and Compliance
The cybersecurity industry gives a lot of attention to protective solutions like firewalls and EDRs. And that makes sense. These technologies are...
System Integrity Monitoring Best Practices
System Integrity Monitoring Best Practices
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Security Frameworks and CIS Controls
Security Frameworks and CIS Controls
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...