Secure Modernization vs. Legacy Systems? FISMA, Government and the DoD

Posted on by Mike Shinn

(Federal agencies are challenged to protect legacy systems while complying with FISMA secure modernization. Atomicorp brings the best of both worlds for protecting existing and modernized hybrid architecture.) Nearly every organization employs a favorite old system or way of doing something, and agencies in the government and the Department of Defense are no different.  We […]

Six Ways to Employ FIM Toward Security and Compliance

Posted on by Mike Shinn

“What is advanced FIM – file integrity monitoring? Leading FIM tools all inspect more than just files, they detect threats, prompt rapid response, and provide a foundation for compliance.”  When there’s turnover and shortage of training, skills or personnel, companies turn to software, SaaS, and process automation from the cloud to help them run, manage […]

Meet PCI-DSS and Compliance Requirements With File Integrity Monitoring Tools (FIM) From Atomicorp

Posted on by Mike Shinn

(File integrity monitoring tools are crucial for meeting security and compliance requirements, but they’re also critical to answering the most important question when something happens: What changed? The following blog and FIM whitepaper explore compliance challenges and empowering agents such as FIM.) Compliance challenges. Manually going through logs. Auditing. Tired human eyes missing evidence of […]

Small Business/SMB Alert: Why Workload and Cloud Workload Protection Matter

Posted on by Mike Shinn

What is a workload? Among non-techy or more traditional sorts, ‘workload’ means the things we have on our plates, those things we must attend to or accomplish. But workload has a more modern meaning in the context of computing disciplines such as compute/analyze/store, cloud workload automation, cloud workload protection/cloud workload security, and an enigmatic thing […]

99 Controls That Security Practitioners Need to Address PCI-DSS Compliance

Posted on by Mike Shinn

Anything that touches anything else that touches cardholder data is part of your state of security and must be included in your security program. The following blog discusses the importance of PCI compliance, how… with clouds forming… visibility and secure control can get lost, and what you can do about it. What is PCI and […]

The Appeal of Open Source Security (OSSEC) to Small and Midsize Businesses

Posted on by Mike Shinn

An open source DevSecOps approach enables small to midsize enterprises to keep pace with security threats as digital business expands. Atomic OSSEC intrusion detection and Atomic Protector cloud workload protection solutions reflect this open source DevSecOps approach, helping small IT teams to rapidly secure the services and apps they must deliver. Cyber-attacks are getting increasingly […]

Open-source intrusion detection system Atomic OSSEC is now available as easy to deploy and manage software as a service (SaaS)

Posted on by Mike Shinn

OSSEC users can deploy security capabilities like file integrity monitoring and host-based intrusion detection system (HIDS) faster and get fuller value via an Atomic OSSEC SaaS model. Atomicorp now offers its Atomic OSSEC security platform through an easy software as a service (SaaS) delivery model. Offering Atomic OSSEC via SaaS provides customers with a number […]

Why DevSecOps Is a Timely Discipline

Posted on by Mike Shinn

DevSecOps… it’s just another buzzword, isn’t it? *** Bzzzzz… Business Transformation. Digital Transformation. Infrastructure Modernization. The cloud and software as a service (SaaS). Virtualization and abstraction. Turnkey automation and orchestration Edge computing. VMs and containers. DevOps. Do more with less. WIth all this buzz and transformation, the security function risks falling behind. But security has […]

Free ModSecurity Rules From Leading OSSEC Provider

Posted on by Mike Shinn

Free ModSecurity Rules provide 100s of rules and basic tools to protect your web application infrastructure and limit false positives. Leveraging our Free ModSecurity Rules provides a starting foundation for threat detection and response, always-on protection, automated tasks, reporting, and compliance. Why ModSecurity? Attack surfaces continue to expand and cyber adversaries are going after the […]

Why File Integrity Monitoring and Shift-Left Security Are Crucial for Container Environments

Posted on by Mike Shinn

Since ancient times, attacks have come under the guise of gifts and other wrapped packages. In today’s digital landscape, Trojan horses, malware and social engineering attacks fool human employees and machines, in order to spy, spread malice, or siphon financial data and money. Files can also get corrupted and then penetrate your digital inventory and […]