CrowdStrike Outage Puts Heightened Focus on New Release Testing and QA

By Scott Shinn The recent CrowdStrike-caused BSOD outage on Microsoft systems has pulled focus on an ordinary but critical process: Extensive testing before rolling out software widely. What happened in the CrowdStrike outage? A bug in a CrowdStrike update has resulted in a global tech disruption for much of the airline industry as well as […]

Varnish Software and Atomicorp Partner on High-Performance, Advanced Security for Web Content Delivery

Varnish will offer Atomicorp web application security rules as part of its Varnish Enterprise WAF solution Los Angeles, California, and Chantilly, Virginia – July 1, 2024 – Varnish Software, a leader in content delivery software solutions, and Atomicorp, an endpoint and cloud workload protection provider, today announced they will partner to provide Atomic ModSecurity Rules […]

Log-Based Intrusion Detection, File Integrity Monitoring (FIM), Vulnerability Detection, Compliance, and SOAR

By Scott Shinn Detect, analyze and respond to changes to computing systems and other signs of intruder activity with log-based IDS and XDR, including file integrity monitoring (FIM), from Atomicorp. Atomic OSSEC is an extended detection and response (XDR) system that addresses six key information security and compliance functional areas: log-based intrusion detection, file integrity […]

Trustwave ModSecurity EOL Ended a Product, Not ModSecurity in General

Enduring Support for Trustwave ModSecurity EOL and ModSec Customers ModSecurity, a popular open-source web application firewall (WAF) for Apache, Nginx, and Microsoft IIS servers, Kubernetes containers, and many web content platforms, has endured both the test of time and false rumors of its demise. As early as August 2021, many in the cybersecurity media and […]

Why Patching Won’t Eliminate All of Your Security Vulnerabilities

By Scott Shinn Vulnerability patching is crucial but not a cure-all. Patching all your known software vulnerabilities in a timely manner may seal off specific backdoors but alone it represents a reactive, whack-a-mole approach to holistic vulnerability management. Go beyond patching: Detect and address backdoors and malware that patching won’t stop, and defend against whole […]

What Is SBOM? Why Software Component Inventory Is Gaining Momentum

Momentum Building for Software Bill of Materials (SBOM) Attestation You’ve probably noticed the acronym SBOM popping up a lot recently—headlines and subject lines trying to liven up the subject with the notion of someone or something “dropping the SBOM.” Will software bill of materials (SBOM) become a household word in supply chain security management and […]

Atomicorp Announces Live Q&A Series on Open Source Security, Cyberdefense, and Compliance

If you prefer videos and virtual discussions over online reading, you’ve come to the right place. Atomicorp will be producing a series of live Q&A webinars, where participants can join us in discussing IT security and compliance challenges and capabilities. In the first session of the series, known as “Charity’s Corner,” we’ll be exploring file […]

Is ModSecurity Dead? Absolutely Not

 Is ModSecurity Dead? Answering the Question Head On. As with any mature and venerable technology, ModSecurity is facing its “Is It Dead?” stage, with some pundits assuming and proclaiming it dead ever since the Trustwave ModSecurity sunsetting and end of support announcement in 2021. We get asked the question a lot by folks who want […]

Real-Time FIM for Rapid Intrusion Detection and Response

Employ real time file integrity monitoring (FIM) to meet always-on security requirements as well as data protection compliance standards such as PCI DSS. Cyberattacks can be sneaky fast, executing their programs, altering your files and source code, and deleting traces of the activity. Many file integrity monitoring (FIM) programs run on a timer based model, […]