Home > Support > Blog
Conquering PCI Section 10 with SageNet and SIEMonster

Conquering PCI Section 10 with SageNet and SIEMonster

On a yearly basis, all organizations that process or handle credit cards are required to validate their security controls based on the Payment Card Industry Data Security Standard (PCI DSS). Requirement 10 of the standard mandates that organizations “track and monitor all access to network resources and cardholder data.” It is one of the most important requirements, and also one of the most difficult to implement effectively.

Monday, September 18, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (789)/Comments (0)/
Categories: Security Services
Cybercriminals Have Set Their Sights on the Energy Sector

Cybercriminals Have Set Their Sights on the Energy Sector

The Associated Press recently reported that oil and gas companies, including some of the largest in the industry that operate along the Gulf Coast near Houston, have become a popular target for hackers. Many companies are using decades-old technology and unprotected wireless signals to connect computer networks to equipment, leaving refineries, pipelines, and chemical plants vulnerable to attack. In fact, the Houston Chronicle reported 350 security incidents and uncovered nearly 900 security flaws at energy companies between 2011 and 2015.

Tuesday, March 28, 2017/Author: The SageNet Team/Number of views (1074)/Comments (0)/
Categories: Security Services
SIEMonster: A Complete SIEM Solution That’s Free and Open Source

SIEMonster: A Complete SIEM Solution That’s Free and Open Source

As IT infrastructures have become more sophisticated and complex, so have the cyberattacks that attempt to infiltrate them. Advanced persistent threats (APTs) are capable of sneaking past defenses and operating undetected for weeks or even months. There are often signs that an attack is taking place, but organizations lack effective tools for monitoring threats and correlating security event information, and in many cases just ignore the signs as false positives.

Monday, December 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (6034)/Comments (0)/
Categories: Security Services
How to Use Managed SIEM to Boost Security and Compliance

How to Use Managed SIEM to Boost Security and Compliance

SIEM is a security management model that provides administrators with a single, holistic view of all security-related data. Records of security events are collected by agents from a variety of sources, including end-user devices, servers, networking devices and security tools.

Monday, February 08, 2016/Author: The SageNet Team/Number of views (1836)/Comments (0)/
Categories: Security Services
Why Big Data Security Analytics Is a Business Necessity

Why Big Data Security Analytics Is a Business Necessity

By analyzing millions of events per second from applications, networks, mobile devices, social media, video, sensors and other data sources, big data security analytics makes it possible to identify and correlate hidden behaviors and trends in complex threats.

Wednesday, September 23, 2015/Author: The SageNet Team/Number of views (2006)/Comments (0)/
Categories: Security Services
RSS
12