paykasa bozdurma
Home > Support > Blog
Software-Defined Perimeter Keeps Network Intruders in the Dark

Software-Defined Perimeter Keeps Network Intruders in the Dark

Cities around the world participated in blackout drills during World War II. Street lights were turned off, automobile headlights were dimmed, and windows were covered with heavy curtains, blankets or blinds. The idea was that enemy bombers would not be able to accurately target what they couldn’t see.

Tuesday, October 30, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (105)/Comments (0)/
Categories: Security Services
Why the Security Operations Center Is Back, and How to Make It Work

Why the Security Operations Center Is Back, and How to Make It Work

A few years ago, the security operations center (SOC) was on the decline. The dedicated security team and facility that you might see in a TV or movie drama were largely phased out in favor of distributed teams and outsourcing. However, the emergence of both targeted external attacks and insider threats have made the SOC a virtual necessity.

Thursday, December 22, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1615)/Comments (0)/
Categories: Security Services
Why Analytics and Threat Intelligence Are Critical to IT Security

Why Analytics and Threat Intelligence Are Critical to IT Security

In the previous post, we announced that Paul Truitt, Vice President of Cybersecurity and Chief Security Officer at SageNet, will join a panel of experts to discuss “Technical Tools for Data Protection” at this week’s NACS (National Association of Convenience Stores) Show in Atlanta. Part of Mr. Truitt’s presentation will focus on security logging and monitoring, and the importance of pulling all logs into a centralized system for correlation, review and alerting.

Tuesday, October 18, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1422)/Comments (0)/
Categories: Security Services
Creating the ‘Invisible Infrastructure’ with a Software-Defined Perimeter

Creating the ‘Invisible Infrastructure’ with a Software-Defined Perimeter

Numerous surveys reflect a growing reliance on cloud services, with organizations moving a broad range of applications and workloads to the cloud. No surprise there — after all, the cloud model has demonstrated a fantastic ability to facilitate simple, powerful and affordable solutions that resolve significant business challenges and deliver peace of mind.

 

Friday, September 16, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1482)/Comments (0)/
Categories: Security Services
Skimming Isn’t the Only Threat to Point-of-Sale Systems

Skimming Isn’t the Only Threat to Point-of-Sale Systems

In recent posts, we have been discussing the problem of point-of-sale (POS) skimmers — devices that thieves add to POS terminals in order to capture payment card numbers, PINs and other sensitive information. Skimmers can be installed in seconds and look almost identical to POS terminals, making them difficult to detect. Skimming at the gas pump is a particular problem for convenience stores and fuel retailers.

Thursday, May 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1631)/Comments (0)/
Categories: Security Services
RSS
12