Blog
Support
CimTrak Integrity Suite
Features
File Integrity Monitoring
Change Control
Integrated Ticketing
Trusted File Registry™
Solutions
Servers
Workstations
Databases
Network Devices
Active Directory / LDAP
Point of Sale (POS)
VMware / ESXi
Compliance
CDM
CJIS
FFIEC
FISMA
GDPR
HIPAA
NERC-CIP
PCI-DSS
SOX
SWIFT CSCF
Security
Cloud Security
Website Security
Docker Security
Tripwire® Alternative
Pricing
Partners
Partner Registration
Partner Deal Registration
Partner Portal
Company
Careers
News
Request a Demo
(219) 796-0726
Cimcor Blog
Cimcor Interview for Hot 150 Cybersecurity Companies
In a recent interview with Lakeshore Public Radio producer and host Chris Nolte, Robert E. Johnson III, shares his thoughts regarding Cimcor's...
Jacqueline von Ogden
11/01/19
Global Costs of Cybercrime in 2017
Jacqueline von Ogden
10/10/17
5 Cybersecurity Tips to Improve Employee Habits
Employees are a first-line defense against threats such as zero-day attacks and breaches. It is critical that they are made aware of basic methods...
Jacqueline von Ogden
09/06/17
Key Features to Look for in File Integrity Monitoring Software
An organization's IT infrastructure monitoring needs to provide alerts for unplanned downtime and network intrusion, as well as secure the systems...
Jacqueline von Ogden
08/01/17
Peyta Raises the Stakes for Businesses
Last month it was AdylKuzz. Last week was Peyta/NotPeyta. How will next month's malware evolve? With each season, organizations can expect a new...
Jacqueline von Ogden
07/12/17
4 Things You Should Know about Your Information Security Architecture
Business information is seemingly at a constant state of risk. Last week’s massive global cyberattack proved just how vulnerable many organizations...
Jacqueline von Ogden
07/05/17
How Host-Based Intrusion Detection System (HIDS) Works
With cyber attacks and hacking all over the news, building up your own company’s security may be on your mind. We know today that a firewall is not...
Jacqueline von Ogden
06/27/17
3 Ways to Mitigate the Human Factors of Cyber Security
Before diving into how to mitigate the human factors of cyber security, perhaps it is best to understand what the term actually represents. The human...
Jacqueline von Ogden
06/20/17
Windows Exploits, Cyberweapons, and You
As we previously discussed in six signs of a data breach in progress, many organizations are not aware of an attack until after it has occurred....
Jacqueline von Ogden
04/26/17
Information Security Architecture: Why You Need To Review
Cybersecurity and information security for an organization is top of mind for many. However, the process of how to "catch up" or stay on top of the...
Shikha Duggal
04/04/17
Subscribe to Email Updates
Recent Posts
Posts by Topic
Cybersecurity
(62)
PCI Compliance
(22)
Data Breach
(16)
Security
(15)
File Integrity Monitoring
(12)
Vulnerability
(12)
Compliance
(11)
GDPR
(9)
data security
(8)
CimTrak
(7)
malware
(7)
POS
(6)
CyberAttack
(4)
Healthcare
(4)
NIST
(4)
Consumer Data
(3)
PCI-DSS
(3)
ransomware
(3)
Active Directory
(2)
CyberThreats
(2)
Hackers
(2)
IT
(2)
Mobile device
(2)
Risk
(2)
Windows
(2)
docker
(2)
Amazon
(1)
BYOD
(1)
CDM
(1)
CSO
(1)
Conferences
(1)
Costs
(1)
Credit Cards
(1)
CyberInsurance
(1)
Data Connectors
(1)
DoD
(1)
FERC
(1)
FISMA
(1)
FedRAMP
(1)
Flex Module
(1)
GSA
(1)
HIPAA
(1)
Industry
(1)
Integrity
(1)
JPMorgan
(1)
Linux
(1)
NCSA
(1)
NERC-CIP
(1)
NERC-CIP Compliance
(1)
NSA
(1)
October
(1)
Pin and Chip
(1)
RMF
(1)
RSA
(1)
SANS
(1)
SC Congress
(1)
Snapchat
(1)
Support
(1)
Target
(1)
Trends
(1)
Verizon
(1)
awards
(1)
containers
(1)
data
(1)
ePHI
(1)
employees
(1)
energy
(1)
heartbleed
(1)
see all