ON-DEMAND WEBINAR /// Reduce security breaches with 6 basic & simple steps: View webinar

CC logo blue CC logo blue
CC logo blue
  • State of Security
  • Zero Trust
  • System Integrity
  • Solutions
    • OVERVIEW
      • CimTrak Overview
      • Industries We Serve
    • CIMTRAK USE CASES
      • Servers
      • Workstations
      • POS Stations
      • Network Devices
      • Directory Services
      • Databases
    • SOLUTIONS
      • File Integrity Monitoring
      • System Hardening
      • Change Control and Configuration
      • Integrated Ticketing
      • Trusted File Registry
      • Cloud Security
      • Docker Security
      • Web Security
  • Compliance
  • Resources
    • Blog
    • News
    • Events
    • Resource Library
    • About Cimcor
  • Partners
    • Portal Login
    • Find a Reseller
    • Channel Partners
    • Technology Partners
    • Marketplace
    • Become a partner
  • State of Security
  • Zero Trust
  • System Integrity
  • Solutions
    • OVERVIEW
      • CimTrak Overview
      • Industries We Serve
    • CIMTRAK USE CASES
      • Servers
      • Workstations
      • POS Stations
      • Network Devices
      • Directory Services
      • Databases
    • SOLUTIONS
      • File Integrity Monitoring
      • System Hardening
      • Change Control and Configuration
      • Integrated Ticketing
      • Trusted File Registry
      • Cloud Security
      • Docker Security
      • Web Security
  • Compliance
  • Resources
    • Blog
    • News
    • Events
    • Resource Library
    • About Cimcor
  • Partners
    • Portal Login
    • Find a Reseller
    • Channel Partners
    • Technology Partners
    • Marketplace
    • Become a partner
Instant Preview
Cybersecurity,
News

Data Security and NIST Compliance

Jacqueline von Ogden
by Jacqueline von Ogden
on November 06, 2018

When hearing the words NIST Compliance,  businesses not familiar with the Federal Information Security Management Act (FISMA) terminology and procedures may cringe, but they don't have to. National ...

Read More
September 28, 2018 • 3 min read
How Can Malware Target Your Organization?
By Jacqueline von Ogden
August 29, 2018 • 4 min read
7 Regulations Requiring File Integrity Monitoring for Compliance
By Jacqueline von Ogden
June 25, 2018 • 3 min read
PCI and File Integrity Monitoring for Businesses
By Jacqueline von Ogden
June 13, 2018 • 3 min read
PCI DSS 3.2.1 FAQs
By Jacqueline von Ogden
June 12, 2018 • 3 min read
Monitoring for Suspicious Network Activity
By Jacqueline von Ogden
May 14, 2018 • 2 min read
GDPR Chapter Summaries: Part 3
By Jacqueline von Ogden
May 10, 2018 • 2 min read
GDPR Chapter Summaries: Part 2
By Jacqueline von Ogden
May 09, 2018 • 2 min read
GDPR Chapter Summaries: Part 1
By Jacqueline von Ogden
May 04, 2018 • 2 min read
5 Tips to Help Manage Enterprise Security and Compliance
By Jacqueline von Ogden

Subscribe to Email Updates

Posts by Topic

  • Cybersecurity (133)
  • Compliance (43)
  • News (42)
  • File Integrity Monitoring (36)
  • Podcast (24)
  • System Integrity Assurance (15)
  • zero trust (12)
  • system hardening (5)
1 2 3 4 5 All Next
CC logo

Real-time, File Integrity Monitoring, System Integrity Assurance, Security, and Compliance.

Instant Preview
  • linkedin
  • facebook
  • twitter

© 2022 Cimcor, Inc

  • Home
  • About Cimcor
  • Find a Reseller
  • Become a Partner
  • Privacy
  • Contact Us
  • State of Security
  • System Integrity
  • Solutions
  • Compliance
  • Resources
  • Partners
  • Trial
  • Quote
  • Pricing