Podcast: What is a WAF and How Are They Different from Firewalls

Web application firewalls (WAFs) have become ubiquitous in our always connected, cloud-driven world. Any device that is exposed to the internet is vulnerable and WAFs can eliminate the risk of entire classes of attacks and vulnerabilities from ever threatening system security. However, not all WAFs and configurations are created equal. Good WAFs block what you […]

Podcast: OSSEC, SIEM and Log-based Intrusion Detection Systems

Atomicorp’s CEO Mike Shinn walks through his experience with logging, SIEM and OSSEC approaches. He breaks down what is important and how the logging space has evolved over the past 20 years from a security perspective, including the introduction of security automation. Log-based Intrusion Detection System – LIDS Log-based intrusion detection (LIDS) was one of […]

Podcast: Meltdown and Spectre Vulnerabilities and Countermeasures Explained

It is not an overstatement to say that the Meltdown and Spectre vulnerabilities were a surprise to the security and microprocessor industries. Chip-level vulnerabilities this severe are rare. Part of the issue stemmed from the fact that the vulnerabilities were created by engineering choices designed to improve microprocessor speed. The engineers had simply not contemplated […]

Podcast: What Is File Integrity Monitoring (FIM)?

File Integrity Monitoring is designed to notify you when files have changed on a system. It was one of the very first security detection capabilities in existence and is almost as old as passwords. FIM for PCI DSS Compliance and Other Security Protocols FIM has also been incorporated into many regulatory and security protocols. Mike […]

Podcast: What is a Brute Force Attack?

A Brute Force Attack is one of the oldest cyber attacks. It was even featured in the 1980’s thriller, War Games. In this episode, Mike Shinn walks through how a Brute Force Attack works, reviews some different flavors of attacks and how to defend against them Atomicorp provides unified workload security for cloud, data center […]

OSSEC Conference Video: File Integrity Monitoring and OSSEC

File Integrity Monitoring is the process of validating the integrity of operating system or application software files using a verification method based on the comparison of the current file state and a known good baseline. Dan Parriott is an OSSEC contributor who has been using the open source solution since 2006. He is a self-proclaimed […]

OSSEC Con Presentation: Adding a GUI to OSSEC

One of the most common questions open source project manager Scott Shinn gets about OSSEC is: Is there a management console or GUI for OSSEC? The answer is not in a traditional sense. The command line interface is effective but does not provide log and event visualization. But the open-source security solution does allow users […]

Atomicorp Adds Amazon Alexa to OSSEC Cybersecurity Solution

Amazon Alexa has ushered in a new era of voice interaction for consumers and the enterprise. Over 47 million consumers in the U.S. have access to a smart speaker at home and last fall Amazon Echos started showing up in the workplace based on the Alexa for Business framework. Atomicorp immediately recognized that voice interaction […]

New Video: OSSEC User Panel from OSSEC Conference 2018

  OSSEC users from around the world came together at the OSSEC Conference 2018 this past April to learn more about the open source security solution. Attendees heard experts discuss the many different ways in which OSSEC can be configured to meet any organization’s needs, from compliance to file integrity management. They also got to […]

OSSEC and PCI DSS Compliance

If you take credit cards, you need to be PCI compliant. That is why adhering to the over 250 requirements set by the Payment Credit Industry is a headache for millions of businesses worldwide. Casey Priester of Prometheus Global addressed these pain points in his presentation at the OSSEC Conference 2018. He discussed how OSSEC […]