5 Attack Methods Continuing Into 2021 and What You Can Do About Them

The 2020 pandemic, which undoubtedly will extend into 2021, has stretched the network. Work at home, once taboo by some stern and stodgy organizations, is now a reality and computing networks have had to become more distributed to support distant employees. Phase 1 of the pandemic was about getting connectivity out; harnessing the internet and […]

Why File Integrity Monitoring and Shift-Left Security Are Crucial for Container Environments

Since ancient times, attacks have come under the guise of gifts and other wrapped packages. In today’s digital landscape, Trojan horses, malware and social engineering attacks fool human employees and machines, in order to spy, spread malice, or siphon financial data and money. Files can also get corrupted and then penetrate your digital inventory and […]

Continuing Our Open Source Commitment through Red Hat OpenShift

Atomicorp is pleased to support Red Hat today in the launch of the Red Hat Marketplace, Red Hat Marketplace is an open cloud marketplace for enterprise customers to discover, try, purchase, deploy, and manage certified container-based software across environments—public and private, cloud and on-premises. Through the marketplace, customers can take advantage of responsive support, streamlined […]

Announcing OSSEC Virtual Con2020

Wednesday, June 24 & Thursday, June 25 Atomicorp is proud to host a fully virtual conference on Wednesday, June 24 and Thursday, June 25. The virtual conference is open to the OSSEC community to share technical insights, lessons learned, and best practices for OSSEC. See Full Schedule   Day 1 – Conference Sessions Conference topics […]

Atomicorp & Intensity Analytics Collaborate to Deliver Identity Assurance Compliance Across Platforms

Atomicorp’s cloud and server security and compliance systems now work with Intensity Analytics’ TickStream.Key.ID to red flag potential account compromises which automatically trigger suspicious activity alerts and support an adaptive security model. In addition, TickStream.Key.ID provides improved visibility into and accountability for privileged access accounts to protect against insider threats. Atomicorp’s products enable customers to […]

PCI Compliance in the Cloud: File Integrity Monitoring and Workload Auditing

This is part 3 of a 7-part series about PCI DSS compliance in the cloud. How to Support Continuous PCI Compliance with Workload Auditing and SIM/FIM    PCI requires organizations to conduct “continuous compliance” on all systems touching cardholder data, rather than just annual PCI audits.  SIM and FIM technologies detect changes to the workload, […]

Security State: The Invisible Condition That Impacts Your PCI

This is part 2 of a 7-part series on PCI compliance in the cloud. Most businesses have assets in their environments that they aren’t aware exist. For instance, if a virtual machine is de-provisioned in the cloud environment, its file system may still live on − unprotected, unaudited, and but still inside the scope of […]

Who’s Responsible for PCI Compliance of Your Cloud Workload

  This is part 1 of seven-part series on achieving PCI compliance in the cloud.   Shared Responsibility isn’t as easy as it sounds When businesses sign a service level agreement with a cloud provider, they may believe the provider will protect everything in their cloud− infrastructure and applications alike.  But in each contract there is […]

Podcast: What is OSSEC and Why People Use It

OSSEC, which is short for open source security, was founded in 2004. It is an open source project for cybersecurity and delivers the most robust endpoint detection and response (EDR) capabilities available to enterprises today. Scott Shinn, OSSEC project manager, introduced its most recent update to 3.0 at the OSSEC conference this past April. In […]

What the Capital One Breach Shows Us About Cloud Workload Protection

What happened?  Many of us woke up to the news that the data of 100 million people were exposed when Capital One’s Amazon servers were breached by Seattle-based hacker.   While information about the specifics of the breach may never be known by the public, this staggering data loss is exceptionally instructive for organizations moving critical […]