Cimcor Blog

What Can Cybersecurity Learn from IT?
What Can Cybersecurity Learn from IT?
Historically, there has been plenty of negativity and friction between IT and cybersecurity teams. Security teams can be seen as ‘blockers’ that...
Top 3 Reasons Security and Compliance Are Going The Wrong Way
Top 3 Reasons Security and Compliance Are Going The Wrong Way
There’s a fundamental truth in the cybersecurity industry that nobody wants to face. Despite cybersecurity budgets and spending ballooning by the...
Podcast: Tony Sager Discusses The Community Defense Model
Podcast: Tony Sager Discusses The Community Defense Model
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tony Sager, SVP &...
Top 5 Network Security Risks and Threats
Top 5 Network Security Risks and Threats
It’s an unpleasant truth that businesses must face: Between vulnerabilities and the ever-changing IT landscape, network security risks continue to...
Data Security and NIST Compliance
Data Security and NIST Compliance
When hearing the words NIST Compliance,  businesses not familiar with the Federal Information Security Management Act (FISMA) terminology and...
5 Tips to Help Manage Enterprise Security and Compliance
5 Tips to Help Manage Enterprise Security and Compliance
  Creating an environment of security and compliance throughout your enterprise can be a challenge as a main goal is to effectively ensure...
5 Cybersecurity Tips to Improve Employee Habits
  Employees are a first-line defense against threats such as zero-day attacks and breaches. It is critical that they are made aware of basic methods...
The Top 5 Security Risks in Docker Container Deployment
The Top 5 Security Risks in Docker Container Deployment
Since Docker’s release in 2013, several vulnerabilities have been discovered that could lead to privilege escalation and arbitrary code execution. In...
Point of Sale Systems: Still at Risk for a Security Breach?
Point of Sale Systems: Still at Risk for a Security Breach?
Information Security Architecture: Why You Need To Review
Information Security Architecture: Why You Need To Review
 Cybersecurity and information security for an organization is top of mind for many. However, the process of how to "catch up" or stay on top of the...