File Integrity Monitoring (FIM) With Atomic OSSEC – Watch the Demo Video

Posted on by sshinn

By Scott Shinn A file integrity monitoring (FIM) system performs the crucial role of detecting system and file changes and determining the who, what, and where. FIM is a requirement of many security and privacy system integrity (SI) standards and regulations and an early warning system for when an intruder or malware strikes. File integrity […]

Log-Based Intrusion Detection, File Integrity Monitoring (FIM), Vulnerability Detection, Compliance, and SOAR

Posted on by sshinn

By Scott Shinn Detect, analyze and respond to changes to computing systems and other signs of intruder activity with log-based IDS and XDR, including file integrity monitoring (FIM), from Atomicorp. Atomic OSSEC is an extended detection and response (XDR) system that addresses six key information security and compliance functional areas: log-based intrusion detection, file integrity […]

Trustwave ModSecurity EOL Ended a Product, Not ModSecurity in General

Posted on by Dean Lombardo

Enduring Support for Trustwave ModSecurity EOL and ModSec Customers ModSecurity, a popular open-source web application firewall (WAF) for Apache, Nginx, and Microsoft IIS servers, Kubernetes containers, and many web content platforms, has endured both the test of time and false rumors of its demise. As early as August 2021, many in the cybersecurity media and […]

Why Patching Won’t Eliminate All of Your Security Vulnerabilities

Posted on by Dean Lombardo

By Scott Shinn Vulnerability patching is crucial but not a cure-all. Patching all your known software vulnerabilities in a timely manner may seal off specific backdoors but alone it represents a reactive, whack-a-mole approach to holistic vulnerability management. Go beyond patching: Detect and address backdoors and malware that patching won’t stop, and defend against whole […]

What Is SBOM? Why Software Component Inventory Is Gaining Momentum

Posted on by Dean Lombardo

Momentum Building for Software Bill of Materials (SBOM) Attestation You’ve probably noticed the acronym SBOM popping up a lot recently—headlines and subject lines trying to liven up the subject with the notion of someone or something “dropping the SBOM.” Will software bill of materials (SBOM) become a household word in supply chain security management and […]

Secure Windows 7, RHEL 7, and Other End-of-Life (EOL), Unsupported Software Systems

Posted on by Dean Lombardo

{We explore the issue of unaddressed end of life (EOL) software security vulnerabilities and the compliance requirements that govern EOL systems and components. The article also offers a solution for protecting EOL operating systems (OSs) ranging across RHEL 5, Ubuntu 16, Windows XP, 2003 and 7, CentOS 7, Solaris 11, and others.}  The Need for […]

Atomicorp Announces Live Q&A Series on Open Source Security, Cyberdefense, and Compliance

Posted on by Dean Lombardo

If you prefer videos and virtual discussions over online reading, you’ve come to the right place. Atomicorp will be producing a series of live Q&A webinars, where participants can join us in discussing IT security and compliance challenges and capabilities. In the first session of the series, known as “Charity’s Corner,” we’ll be exploring file […]

Posted in Uncategorized | Comments Off on Atomicorp Announces Live Q&A Series on Open Source Security, Cyberdefense, and Compliance

Is ModSecurity Dead? Absolutely Not

Posted on by Dean Lombardo

 Is ModSecurity Dead? Answering the Question Head On. As with any mature and venerable technology, ModSecurity is facing its “Is It Dead?” stage, with some pundits assuming and proclaiming it dead ever since the Trustwave ModSecurity sunsetting and end of support announcement in 2021. We get asked the question a lot by folks who want […]

Secure Linux and Apps With XDR Plus Compliance

Posted on by Dean Lombardo

Free and open source Linux runs servers, desktop distributions, commercial mobile devices such as Android and Nokia, and virtualized server environments like Kubernetes clusters and containers. Linux even runs supercomputing. Accordingly, Linux skills are in high demand, both for software application development and for API and kernel level security. Whether you’re a do–it-yourself open source […]

Reinforce AIX Endpoint Security With Atomic OSSEC

Posted on by Dean Lombardo

By Scott Shinn (This article and video demonstration show how to orchestrate additional security and compliance controls to your AIX environments.)  AIX is a well-embedded operating system that has persisted 37 years and remains popular today. Technically not a legacy product, AIX is still commercially supported. IBM owns AIX, as well as Red Hat and […]