paykasa bozdurma
Home > Support > Blog
Software-Defined Perimeter Keeps Network Intruders in the Dark

Software-Defined Perimeter Keeps Network Intruders in the Dark

Cities around the world participated in blackout drills during World War II. Street lights were turned off, automobile headlights were dimmed, and windows were covered with heavy curtains, blankets or blinds. The idea was that enemy bombers would not be able to accurately target what they couldn’t see.

Tuesday, October 30, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (105)/Comments (0)/
Categories: Security Services
Mitigating IoT Threats with a Security Fabric

Mitigating IoT Threats with a Security Fabric

The network perimeter has grown larger and more porous in recent years thanks to increasing numbers of remote and mobile workers and cloud-based applications. Now the network is expanding at an ever-more-rapid pace as billions of IP-enabled devices are added to the mix.

Monday, March 06, 2017/Author: Mike Waters, VP, Product Architecture/Number of views (1123)/Comments (0)/
Categories: Security Services
Gaining PCI Compliance with a Software-Defined Perimeter

Gaining PCI Compliance with a Software-Defined Perimeter

In a previous post we discussed how a software-defined perimeter (SDP) can improve the security of key resources in cloud and multitenant computing environments. As we prepare for implementation of the latest update of the Payment Card Industry Data Security Standard (PCI DSS), it is important to note that the SDP framework delivers significant compliance capabilities.

Wednesday, September 21, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1803)/Comments (0)/
Categories: Security Services
Skimming Isn’t the Only Threat to Point-of-Sale Systems

Skimming Isn’t the Only Threat to Point-of-Sale Systems

In recent posts, we have been discussing the problem of point-of-sale (POS) skimmers — devices that thieves add to POS terminals in order to capture payment card numbers, PINs and other sensitive information. Skimmers can be installed in seconds and look almost identical to POS terminals, making them difficult to detect. Skimming at the gas pump is a particular problem for convenience stores and fuel retailers.

Thursday, May 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1631)/Comments (0)/
Categories: Security Services
Why Network Segmentation Is Critical to Effective Security

Why Network Segmentation Is Critical to Effective Security

Most organizations focus their security efforts on the network perimeter in an effort to prevent unauthorized users from gaining access.  But while perimeter security is important, it does little to minimize the damage should a hacker find a way inside.

Tuesday, January 12, 2016/Author: The SageNet Team/Number of views (2464)/Comments (0)/
Categories: Security Services
RSS