Cimcor Blog

Security Frameworks and CIS Controls
Security Frameworks and CIS Controls
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Managing Vulnerabilities and Staying Compliant
Managing Vulnerabilities and Staying Compliant
Inadequate and ineffective technologies are often the culprit behind the failure of compliance mandates and initiatives for many organizations....
CDM Compliance and Cybersecurity Risks
CDM Compliance and Cybersecurity Risks
The Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM)  is a critical component of the government’s cybersecurity...
Can You Mitigate Risk with Compliance and Integrity Monitoring for HIPAA and Healthcare?
Can You Mitigate Risk with Compliance and Integrity Monitoring for HIPAA and Healthcare?
The Health Insurance Portability & Accountability Act (HIPAA) was instituted in 1996, just as medical information was making the transition to the...
7 Regulations Requiring File Integrity Monitoring for Compliance
7 Regulations Requiring File Integrity Monitoring for Compliance
Maintaining compliance can be a challenge with  limited budgets and resources.  Challenges by compliance and IT professionals include resource...
GDPR Chapter Summaries: Part 3
GDPR Chapter Summaries: Part 3
  Reviewing GDPR chapters and their summaries can help with understanding the scope of GDPR compliance.  Join us for Part 3 of GDPR Chapter Summaries.
GDPR Chapter Summaries: Part 2
GDPR Chapter Summaries: Part 2
  Achieving compliance with the General Data Protection Regulation (GDPR) does not hard to be an arduous process. Reviewing chapters and their...
GDPR Chapter Summaries: Part 1
GDPR Chapter Summaries: Part 1
When achieving compliance with General Data Protection Regulation (GDPR), the amount of time spent by organizations attempting to define and decipher...
5 Tips to Help Manage Enterprise Security and Compliance
5 Tips to Help Manage Enterprise Security and Compliance
  Creating an environment of security and compliance throughout your enterprise can be a challenge as a main goal is to effectively ensure...
How File Integrity Monitoring (FIM) Helps with GDPR Compliance
How File Integrity Monitoring (FIM) Helps with GDPR Compliance
  Ensuring General Data Protection Regulation (GDPR) compliance may be easier than you think, and the right software and systems in place can help...