ModSecurity Download for VARs, OEMs, Web Hosting Panels

Posted on by Dean Lombardo

Open source WAF ModSecurity downloads are available from Atomicorp, which also offers ModSecurity support.  ModSecurity Download for Resellers and Web Hosting Managers   For many organizations, the future of ModSecurity for web application security became uncertain following Trustwave’s 2021 decision to no longer develop and provide ModSecurity support. In this void, long-time ModSecurity Rules provider Atomicorp […]

Why ‘Firewall’ Your Core Servers? Zero Trust and Defense in Depth in Action

Posted on by Dean Lombardo

Zero trust principles shouldn’t only be applied to the untrusted internet and traffic from the web. The security perimeter—no matter how dynamic—isn’t foolproof and can be breached and bad actors can get inside in a number of ways. Be able to stop a threat that has already penetrated your core by filtering east-to-west traffic and […]

Get Continuous ModSecurity WAF Updates Against the Latest Web Attacks

Posted on by Dean Lombardo

Atomic ModSecurity Rules and Atomic WAF filter traffic between your web servers, web connections and the internet, blocking known malicious sources, sites and users, while supporting secure access for authentic connection points and users.   Learn More Web-Based Bombardment Requires Continuous WAF Enhancement   Inbound traffic from the internet represents the most frequent source of onslaught upon […]

AIX Server Exploit Reinforces Need for Enhanced Security on Legacy Systems

Posted on by Dean Lombardo

By Scott Shinn (Are your AIX servers safe against advanced persistent threats? Boost AIX server security and block lateral movement into Windows and Linux environments—with Atomicorp.) The AIX Server Hack in Review AIX is a venerable operating system still employed by an estimated tens of thousands of global organizations, including many Fortune 500 companies. It […]

Deepen Security With Malware Memory Analysis for Fileless Malware Detection

Posted on by Dean Lombardo

By Dean Lombardo What is malware memory analysis? This article explores the important role of malware memory analysis in fileless malware detection. Hackers and malware programs don’t need files to infect your computer systems. They can inject malicious code directly into system memory, often after tricking a user into clicking on an attachment or link. […]

Varnish Software and Atomicorp Partner on High-Performance, Advanced Security for Web Content Delivery

Posted on by Dean Lombardo

Varnish will offer Atomicorp web application security rules as part of its Varnish Enterprise WAF solution Los Angeles, California, and Chantilly, Virginia – July 1, 2024 – Varnish Software, a leader in content delivery software solutions, and Atomicorp, an endpoint and cloud workload protection provider, today announced they will partner to provide Atomic ModSecurity Rules […]

Trustwave ModSecurity EOL Ended a Product, Not ModSecurity in General

Posted on by Dean Lombardo

Enduring Support for Trustwave ModSecurity EOL and ModSec Customers ModSecurity, a popular open-source web application firewall (WAF) for Apache, Nginx, and Microsoft IIS servers, Kubernetes containers, and many web content platforms, has endured both the test of time and false rumors of its demise. As early as August 2021, many in the cybersecurity media and […]

Why Patching Won’t Eliminate All of Your Security Vulnerabilities

Posted on by Dean Lombardo

By Scott Shinn Vulnerability patching is crucial but not a cure-all. Patching all your known software vulnerabilities in a timely manner may seal off specific backdoors but alone it represents a reactive, whack-a-mole approach to holistic vulnerability management. Go beyond patching: Detect and address backdoors and malware that patching won’t stop, and defend against whole […]

What Is SBOM? Why Software Component Inventory Is Gaining Momentum

Posted on by Dean Lombardo

Momentum Building for Software Bill of Materials (SBOM) Attestation You’ve probably noticed the acronym SBOM popping up a lot recently—headlines and subject lines trying to liven up the subject with the notion of someone or something “dropping the SBOM.” Will software bill of materials (SBOM) become a household word in supply chain security management and […]

Secure Windows 7, RHEL 7, and Other End-of-Life (EOL), Unsupported Software Systems

Posted on by Dean Lombardo

{We explore the issue of unaddressed end of life (EOL) software security vulnerabilities and the compliance requirements that govern EOL systems and components. The article also offers a solution for protecting EOL operating systems (OSs) ranging across RHEL 5, Ubuntu 16, Windows XP, 2003 and 7, CentOS 7, Solaris 11, and others.}  The Need for […]