Comprehensive zero trust security must bridge seven architectural pillars to protect sensitive data and IT and OT systems. Let Atomicorp zero trust monitoring and detection help to achieve your zero trust objectives and vision with defense-in-depth endpoint, cloud and application system protection and professional support. Zero Trust Monitoring, Detection, and Response Zero trust is a […]
NIST SP 800-53 is a mandatory security framework for U.S. federal agencies, established under FISMA, OMB A-130, and other laws. It safeguards federal data—including classified, unclassified, PII, CUI, health, and financial information—by requiring security controls against threats. NIST 800-53 compliance is required for all federal information systems and forms the basis for federal security regulations […]
Legacy or end of life (EOL) systems can come with tradeoffs in obsolescence and risk. Older operating systems may still work fine, but the application of AV, change detection, and system monitoring on these legacy systems presents a challenge. You no longer have to leave productive legacy IT or OT systems digitally unmonitored, unsupervised, underprotected […]
Operational technology (OT) outages can disrupt our everyday physical lives, impacting equipment at large-scale power plants, traffic lights, patient care equipment, and manufacturers and distributors meeting demand. The more critical the OT’s function, the more devastating the impact of an attack or outage. OT cyberthreats don’t go away just because your industrial control system (ICS), […]
Cloud- and network-based firewalls comprise the majority of firewall deployments today, but they aren’t the solution for every organization, every use case, every threat. Atomic OSSEC endpoint firewall protection offers advantages remote firewall coverage cannot. What Are the Different Types of Firewalls? Fundamental differences exist between remote cloud and network firewalls and endpoint firewalls. Endpoint […]
Don’t leave your legacy or end of life (EOL) systems exposed due to a false sense of security or misconception that security software and service are no longer available for the platform. AIX and Solaris have become legacy platforms; many cybersecurity vendors have dropped support for these OSs, especially the end of life (EOL) versions—or […]
Atomic OSSEC SIEM collects, distills and analyzes severity-based threat, vulnerability, and FIM events, and other indicators of attack. A security information and event management (SIEM) system is only as good as the quality of information it provides. Too many alerts and too many data points can result in mountains of data for security engineers, analysts, […]
(Facilitate NIST 800-171 and ISO 27001 compliance with the NIST 800-171 security controls in Atomic OSSEC, the most advanced version of OSSEC HIDS.) NIST Special Publication (SP) 800-171 is a security compliance guideline that primarily affects government contractors and suppliers to the DoD. Federal agencies require NIST 800-171 adherence in contractual agreements with nonfederal organizations […]
Zero trust principles shouldn’t only be applied to the untrusted internet and traffic from the web. The security perimeter—no matter how dynamic—isn’t foolproof and can be breached and bad actors can get inside in a number of ways. Be able to stop a threat that has already penetrated your core by filtering east-to-west traffic and […]
By Dean Lombardo What is malware memory analysis? This article explores the important role of malware memory analysis in fileless malware detection. Hackers and malware programs don’t need files to infect your computer systems. They can inject malicious code directly into system memory, often after tricking a user into clicking on an attachment or link. […]