The Appeal of Open Source Security (OSSEC) to Small and Midsize Businesses

An open source DevSecOps approach enables small to midsize enterprises to keep pace with security threats as digital business expands. Atomic OSSEC intrusion detection and Atomic Protector cloud workload protection solutions reflect this open source DevSecOps approach, helping small IT teams to rapidly secure the services and apps they must deliver. Cyber-attacks are getting increasingly […]

Open-source intrusion detection system Atomic OSSEC is now available as easy to deploy and manage software as a service (SaaS)

OSSEC users can deploy security capabilities like file integrity monitoring and host-based intrusion detection system (HIDS) faster and get fuller value via an Atomic OSSEC SaaS model. Atomicorp now offers its Atomic OSSEC security platform through an easy software as a service (SaaS) delivery model. Offering Atomic OSSEC via SaaS provides customers with a number […]

Why OSSEC and How to Enhance Benefits Today

By Dean Lombardo There are few single-source private data networks or datacenters anymore, with digitally transforming organizations dependent on a mix of internal, service provider, and cloud infrastructure provider network endpoints to access, store and share their information. Toward securing this hybrid, distributed computing, many organizations have turned to the agile and flexible Open Source […]

Why DevSecOps Is a Timely Discipline

DevSecOps… it’s just another buzzword, isn’t it? *** Bzzzzz… Business Transformation. Digital Transformation. Infrastructure Modernization. The cloud and software as a service (SaaS). Virtualization and abstraction. Turnkey automation and orchestration Edge computing. VMs and containers. DevOps. Do more with less. WIth all this buzz and transformation, the security function risks falling behind. But security has […]

Free ModSecurity Rules From Leading OSSEC Provider

Free ModSecurity Rules provide 100s of rules and basic tools to protect your web application infrastructure and limit false positives. Leveraging our Free ModSecurity Rules provides a starting foundation for threat detection and response, always-on protection, automated tasks, reporting, and compliance. Why ModSecurity? Attack surfaces continue to expand and cyber adversaries are going after the […]

With File Integrity Monitoring, Visibility, Control and Compliance Don’t Have to Be Lost in the Cloud

By Atomicorp IT infrastructure abstraction to the Internet and cloud, while allowing you to roll out applications faster, comes with a cost. It dims your visibility and control over the full scope of your server and desktop environments, applications, files and containers. For today’s digital security and compliance reality you need file integrity monitoring. You […]

Lessons (and Defenses) Learned From the SolarWinds ‘Sunburst/Dark Halo’ Hack)

The widely reported December 2020 hack of the SolarWinds Orion network performance monitoring system employed a sophisticated series of takeover steps that included backdoors, expired domains, the use of Orion itself as a vector, compromised credentials, and malware implants, all to steal data and compromise systems. The attack, referred to as Sunburst, Sunburst Backdoor, and […]

How to Defend Against Lateral Movement in Windows With OSSEC

You may have started to see greater usage of the term “lateral movement” with regards to cyber attacks. Long a directional and network traffic term, lateral movement now commonly means unauthorized connection and sharing of files between two or more internal endpoints. While an initial breach usually comes from the outside, lateral movement occurs when […]

5 Attack Methods Continuing Into 2021 and What You Can Do About Them

The 2020 pandemic, which undoubtedly will extend into 2021, has stretched the network. Work at home, once taboo by some stern and stodgy organizations, is now a reality and computing networks have had to become more distributed to support distant employees. Phase 1 of the pandemic was about getting connectivity out; harnessing the internet and […]