Cimcor Blog

Top 20 Problems File Integrity Monitoring (FIM) Helps Solve Part 2
Top 20 Problems File Integrity Monitoring (FIM) Helps Solve Part 2
In part two of this three-part series, we discuss the pressure CIOs and CISOs face under the umbrella of security and compliance. File Integrity...
Top 20 Problems File Integrity Monitoring (FIM) Helps Solve
Top 20 Problems File Integrity Monitoring (FIM) Helps Solve
CIOs and CISOs are under constant barrage and pressure to deliver more with fewer resources and less capital, all while continuing to meet any number...
Enhancing SIEM Data with File Integrity Monitoring
Enhancing SIEM Data with File Integrity Monitoring
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Are all FIMs Created Equal?
Are all FIMs Created Equal?
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
Podcast: System Integrity Monitoring Best Practices
Podcast: System Integrity Monitoring Best Practices
DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III, Cimcor...
7 Regulations Requiring File Integrity Monitoring for Compliance
Maintaining compliance can be a challenge with  limited budgets and resources.  Challenges by compliance and IT professionals include resource...
PCI and File Integrity Monitoring for Businesses
PCI and File Integrity Monitoring for Businesses
The Payment Card Industry Data Security Standard (PCI DSS) has been in effect since 2004, but the need for continued compliance strategies is just as...
5 Effective Ways to Oversee Your Infrastructure with File Integrity Monitoring Software
5 Effective Ways to Oversee Your Infrastructure with File Integrity Monitoring Software
Today’s ever-shifting IT environment requires a comprehensive security plan to remain compliant and successful—regardless of your industry. As an IT...
How to Create a File Integrity Monitoring Strategy
How to Create a File Integrity Monitoring Strategy
Businesses of all sizes have strategies in place applying to various aspects of their operations. From marketing to finance and from sales to hiring,...
Key Features to Look for in File Integrity Monitoring Software
Key Features to Look for in File Integrity Monitoring Software
An organization's  IT infrastructure monitoring needs to provide alerts for unplanned downtime and network intrusion,  as well as secure the systems...