Syndicated Blog

Cimcor Blog
CimTrak Helps Detect Changes Throughout the Enterprise. Thoughtful Insights on PCI Compliance, File Integrity Monitoring, and Data Security
AI in Cybercrime: Hackers Exploiting OpenAI

AI in Cybercrime: Hackers Exploiting OpenAI

| | cybercrime, Podcast
In a recent podcast interview with Cybercrime Magazine's host, Charlie Osborne, Heather Engel, Managing Partner at Strategic Cyber Partners, discusses reports from OpenAI that hackers are trying to use its tools for ...
Achieving DORA Compliance: A Guide to Meeting Key ICT Control Requirements Using CimTrak

Achieving DORA Compliance: A Guide to Meeting Key ICT Control Requirements Using CimTrak

| | CimTrak
The Digital Operational Resilience Act (DORA) - Regulation (EU) 2022/2554 has established strict guidelines for financial institutions to bolster digital resilience and protect against cybersecurity risks. Compliance with DORA mandates implementing a ...
How to Create a File Integrity Monitoring Strategy

How to Create a File Integrity Monitoring Strategy

Businesses of all sizes have strategies that apply to various aspects of their operations. From marketing to finance and from sales to hiring, strategies must be developed and implemented across departments ...
Key Features to Look for in File Integrity Monitoring Software

Key Features to Look for in File Integrity Monitoring Software

An organization's IT infrastructure monitoring needs to provide alerts for unplanned downtime and network intrusion and secure the systems and data. To accomplish this, File Integrity Monitoring (FIM) can be implemented. Whether ...
Shifting Left for Proactive IT Security and ITSM

Shifting Left for Proactive IT Security and ITSM

As organizations prioritize IT security and efficiency, the concept of "shifting left" has gained momentum across both security and service management. Traditionally, many IT security and IT Service Management (ITSM) practices have ...
The 6 Most Common Network Vulnerabilities Haunting CSOs in 2024

The 6 Most Common Network Vulnerabilities Haunting CSOs in 2024

| | cybercrime, Cybersecurity
Network security is significantly more challenging than it was several years ago. Today's IT teams struggle against a cybersecurity talent shortage, an increasing number of endpoints in their network, and the ever-changing ...
How to Achieve a Secure and Resilient IT Infrastructure in 6 Steps

How to Achieve a Secure and Resilient IT Infrastructure in 6 Steps

Securing IT infrastructure is a continual journey for every security team. A resilient infrastructure enables organizations to not only defend against modern cyber threats but also to quickly recover from attacks or ...
Disney Leak Reveals Financial and Strategy Secrets

Disney Leak Reveals Financial and Strategy Secrets

| | cybercrime, Podcast
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, discusses a recent data breach affecting information ...
Breaking Down the House's New Artificial Intelligence Policy

Breaking Down the House’s New Artificial Intelligence Policy

|
In a groundbreaking move, the House Administration Committee, along with the Chief Administrative Officer (CAO) for the House of Representatives, have introduced a comprehensive policy aimed at governing the use of artificial ...
Defending Against Ransomware Threats: Tactics and Procedures Revealed by CISA

Defending Against Ransomware Threats: Tactics and Procedures Revealed by CISA

| | cybercrime
In a recent announcement, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning about the increasing ransomware threat posed by Iran-based cyber actors. The advisory highlighted the specific tactics, techniques, and ...