paykasa bozdurma
Home > Support > Blog
How SIEM Enables You to Take a More Proactive Approach to Security

How SIEM Enables You to Take a More Proactive Approach to Security

The news is filled with stories about cybersecurity threats, from ransomware to Facebook hacks. Major industry conferences have sessions on cybersecurity headlining the agenda. This isn’t hype. The threats are real. The risk is real. And the likelihood of a data breach increases every day. 

Tuesday, November 13, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (30)/Comments (0)/
Categories: Security Services
Tags:
Software-Defined Perimeter Keeps Network Intruders in the Dark

Software-Defined Perimeter Keeps Network Intruders in the Dark

Cities around the world participated in blackout drills during World War II. Street lights were turned off, automobile headlights were dimmed, and windows were covered with heavy curtains, blankets or blinds. The idea was that enemy bombers would not be able to accurately target what they couldn’t see.

Tuesday, October 30, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (105)/Comments (0)/
Categories: Security Services
How to Break the Cyberattack Chain and Prevent a Security Breach

How to Break the Cyberattack Chain and Prevent a Security Breach

The SageNet Cybersecurity team has seen a recent trend in phishing attacks against organizations with Office 365. Using open source intelligence (OSINT) techniques, such as searching Google or LinkedIn, attackers are gathering email addresses of employees of the target organization and sending phishing emails from outside the organization. The goal of this campaign is to collect the Office 365 credentials of one or more employees.

Monday, April 02, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (395)/Comments (0)/
Categories: Security Services
Do You Have the Resources to Effectively Secure the IoT and the Cloud?

Do You Have the Resources to Effectively Secure the IoT and the Cloud?

The cybersecurity skills gap is rapidly getting wider, according to a new report from the Information Systems Security Association and Enterprise Strategy Group. More than half (51 percent) of organizations reported a “problematic shortage” of cybersecurity skills in 2018, up from 45 percent in 2017. This skills shortage is increasing the workload of existing staff, according to 63 percent of cybersecurity professionals.

Tuesday, February 20, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (452)/Comments (0)/
Categories: Security Services
Remote Code Execution Vulnerabilities Dominate the Security Headlines

Remote Code Execution Vulnerabilities Dominate the Security Headlines

On Nov. 8, Microsoft published a security advisory about a remote code execution vulnerability in Microsoft Office documents with Dynamic Data Exchange (DDE) fields. The advisory was related to three separate phishing campaigns containing attachments that used the DDE protocol to download and execute malicious code.

Wednesday, December 06, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (470)/Comments (0)/
Categories: Security Services
RSS
12