Home > Support > Blog
Why Analytics and Threat Intelligence Are Critical to IT Security

Why Analytics and Threat Intelligence Are Critical to IT Security

In the previous post, we announced that Paul Truitt, Vice President of Cybersecurity and Chief Security Officer at SageNet, will join a panel of experts to discuss “Technical Tools for Data Protection” at this week’s NACS (National Association of Convenience Stores) Show in Atlanta. Part of Mr. Truitt’s presentation will focus on security logging and monitoring, and the importance of pulling all logs into a centralized system for correlation, review and alerting.

Tuesday, October 18, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1556)/Comments (0)/
Categories: Security Services
Chief Information Security Officer: The IT Security Pro You Can’t Live Without

Chief Information Security Officer: The IT Security Pro You Can’t Live Without

A CISO is a senior-level security executive whose role is to align an organization’s IT security strategy and processes with its business goals and operations. This will ensure that corporate information, applications and technology are protected and IT investments are optimized. Just as security is no longer limited to the network perimeter, the role of the CISO has outgrown the data center and now includes risk reduction and board-level responsibilities.

Thursday, February 04, 2016/Author: The SageNet Team/Number of views (1792)/Comments (0)/
Categories: Security Services
A Look Ahead: Digital Signage in 2016

A Look Ahead: Digital Signage in 2016

In our last post, we hauled out our crystal ball and made forecasts of some technology trends for 2016. Security, the Internet of Things (IoT) and big data analytics made our short list of technologies that will matter in the coming year. We also predicted that customer demands will continue to drive business strategies and technology investments, and those organizations that get the customer experience right will be the market leaders in 2016 and beyond.

Monday, January 04, 2016/Author: The SageNet Team/Number of views (2380)/Comments (0)/
Don’t Be Duped by a Phishing Attack

Don’t Be Duped by a Phishing Attack

Today, phishing occurs mostly through email, although instant messages, texts and social networking sites are also popular avenues for attack. Usernames and passwords, financial account information, social security numbers and basic contact information are the most common targets of phishing attacks.

Monday, August 17, 2015/Author: The SageNet Team/Number of views (2259)/Comments (0)/
Categories: Security Services
IT Security Is Everybody’s Job

IT Security Is Everybody’s Job

In our last two posts, we discussed the importance of an incident response plan and strategies for developing an incident response plan that works. We also described the ideal incident response team, which should include representatives from IT, security, legal, HR, public relations and customer service.


Thursday, August 06, 2015/Author: The SageNet Team/Number of views (2077)/Comments (0)/
Categories: Security Services
RSS
12