Cimcor Blog

Jacqueline von Ogden

Since 1999, Jacqueline has written for corporate communications, MarCom agencies, higher education, and worked within the pharmacy, steel and retail industries. Since joining the tech industry, she has found her "home".

9 PCI Myths That Can Cost CIOs
9 PCI Myths That Can Cost CIOs
As breaches continue to happen, the adage of not if but when continues to ring true. The following 9 myths regarding PCI compliance are worth a...
Making Sense of FISMA Compliance
Making Sense of FISMA Compliance
Government-affiliated entities and organizations continue to be targets for IT security as they handle both classified government information and a...
CJIS Requirements: What Businesses Need to Know
CJIS Requirements: What Businesses Need to Know
The advancement and evolution of cloud computing over the years has created challenges when it comes to data security, compliance and incident...
5 Takeaways on Cloud Security
5 Takeaways on Cloud Security
While those in IT are sold on moving to the cloud, they’re equally deterred by the security threats. Time is of the essence. According to CSO, more...
Top Security Objectives for CDM Compliance
Top Security Objectives for CDM Compliance
As more organizations are required to comply with Phase 3 Continuous Diagnostics & Mitigations (CDM) requirements, the objectives for organizations...
CDM Compliance and Cybersecurity Risks
CDM Compliance and Cybersecurity Risks
The Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM)  is a critical component of the government’s cybersecurity...
Can You Mitigate Risk with Compliance and Integrity Monitoring for HIPAA and Healthcare?
Can You Mitigate Risk with Compliance and Integrity Monitoring for HIPAA and Healthcare?
The Health Insurance Portability & Accountability Act (HIPAA) was instituted in 1996, just as medical information was making the transition to the...
Data Security and NIST Compliance
Data Security and NIST Compliance
When hearing the words NIST Compliance,  businesses not familiar with the Federal Information Security Management Act (FISMA) terminology and...
How Can Malware Target Your Organization?
How Can Malware Target Your Organization?
The threat landscape for digital security is ever-changing, but one thing remains the same: information security continues to grow in importance.  In...
7 Regulations Requiring File Integrity Monitoring for Compliance
7 Regulations Requiring File Integrity Monitoring for Compliance
Maintaining compliance can be a challenge with  limited budgets and resources.  Challenges by compliance and IT professionals include resource...