Home > Support > Blog
Conquering PCI Section 10 with SageNet and SIEMonster

Conquering PCI Section 10 with SageNet and SIEMonster

On a yearly basis, all organizations that process or handle credit cards are required to validate their security controls based on the Payment Card Industry Data Security Standard (PCI DSS). Requirement 10 of the standard mandates that organizations “track and monitor all access to network resources and cardholder data.” It is one of the most important requirements, and also one of the most difficult to implement effectively.

Monday, September 18, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (855)/Comments (0)/
Categories: Security Services
Why the Security Operations Center Is Back, and How to Make It Work

Why the Security Operations Center Is Back, and How to Make It Work

A few years ago, the security operations center (SOC) was on the decline. The dedicated security team and facility that you might see in a TV or movie drama were largely phased out in favor of distributed teams and outsourcing. However, the emergence of both targeted external attacks and insider threats have made the SOC a virtual necessity.

Thursday, December 22, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1857)/Comments (0)/
Categories: Security Services
SIEMonster: A Complete SIEM Solution That’s Free and Open Source

SIEMonster: A Complete SIEM Solution That’s Free and Open Source

As IT infrastructures have become more sophisticated and complex, so have the cyberattacks that attempt to infiltrate them. Advanced persistent threats (APTs) are capable of sneaking past defenses and operating undetected for weeks or even months. There are often signs that an attack is taking place, but organizations lack effective tools for monitoring threats and correlating security event information, and in many cases just ignore the signs as false positives.

Monday, December 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (6443)/Comments (0)/
Categories: Security Services
Why Analytics and Threat Intelligence Are Critical to IT Security

Why Analytics and Threat Intelligence Are Critical to IT Security

In the previous post, we announced that Paul Truitt, Vice President of Cybersecurity and Chief Security Officer at SageNet, will join a panel of experts to discuss “Technical Tools for Data Protection” at this week’s NACS (National Association of Convenience Stores) Show in Atlanta. Part of Mr. Truitt’s presentation will focus on security logging and monitoring, and the importance of pulling all logs into a centralized system for correlation, review and alerting.

Tuesday, October 18, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1634)/Comments (0)/
Categories: Security Services
RSS