Why Patching Won’t Eliminate All of Your Security Vulnerabilities

By Scott Shinn Vulnerability patching is crucial but not a cure-all. Patching all your known software vulnerabilities in a timely manner may seal off specific backdoors but alone it represents a reactive, whack-a-mole approach to holistic vulnerability management. Go beyond patching: Detect and address backdoors and malware that patching won’t stop, and defend against whole […]

What Is SBOM? Why Software Component Inventory Is Gaining Momentum

Momentum Building for Software Bill of Materials (SBOM) Attestation You’ve probably noticed the acronym SBOM popping up a lot recently—headlines and subject lines trying to liven up the subject with the notion of someone or something “dropping the SBOM.” Will software bill of materials (SBOM) become a household word in supply chain security management and […]

Atomicorp Announces Live Q&A Series on Open Source Security, Cyberdefense, and Compliance

If you prefer videos and virtual discussions over online reading, you’ve come to the right place. Atomicorp will be producing a series of live Q&A webinars, where participants can join us in discussing IT security and compliance challenges and capabilities. In the first session of the series, known as “Charity’s Corner,” we’ll be exploring file […]

Is ModSecurity Dead? Absolutely Not

 Is ModSecurity Dead? Answering the Question Head On. As with any mature and venerable technology, ModSecurity is facing its “Is It Dead?” stage, with some pundits assuming and proclaiming it dead ever since the Trustwave ModSecurity sunsetting and end of support announcement in 2021. We get asked the question a lot by folks who want […]

Real-Time FIM for Rapid Intrusion Detection and Response

Employ real time file integrity monitoring (FIM) to meet always-on security requirements as well as data protection compliance standards such as PCI DSS. Cyberattacks can be sneaky fast, executing their programs, altering your files and source code, and deleting traces of the activity. Many file integrity monitoring (FIM) programs run on a timer based model, […]

Secure Linux and Apps With XDR Plus Compliance

Free and open source Linux runs servers, desktop distributions, commercial mobile devices such as Android and Nokia, and virtualized server environments like Kubernetes clusters and containers. Linux even runs supercomputing. Accordingly, Linux skills are in high demand, both for software application development and for API and kernel level security. Whether you’re a do–it-yourself open source […]

Reinforce AIX Endpoint Security With Atomic OSSEC

By Scott Shinn (This article and video demonstration show how to orchestrate additional security and compliance controls to your AIX environments.)  AIX is a well-embedded operating system that has persisted 37 years and remains popular today. Technically not a legacy product, AIX is still commercially supported. IBM owns AIX, as well as Red Hat and […]

What’s the Difference Between OSSEC, OSSEC+ and Atomic OSSEC

By Scott Shinn What’s the difference between OSSEC, OSSEC+, and Atomic OSSEC? We get asked that a lot. The quick answer is thousands of additional open source security rules, frequent updates and software integrations for real-time endpoint and cloud workload detection, built-in active response beyond HIDS, a graphical user interface (GUI), compliance capabilities, and expert […]

Combining Ghidra Reverse Engineering and OSSEC Protection

By Scott Shinn Ghidra is an open source reverse engineering tool developed by the NSA. Four years mature, Ghidra is a solid tool that can be used to disable attacks at the root, enabling you to take the malware apart and build immunities. It’s reverse engineering via an open source tool today. At the February […]