Home > Support > Blog
Conquering PCI Section 10 with SageNet and SIEMonster

Conquering PCI Section 10 with SageNet and SIEMonster

On a yearly basis, all organizations that process or handle credit cards are required to validate their security controls based on the Payment Card Industry Data Security Standard (PCI DSS). Requirement 10 of the standard mandates that organizations “track and monitor all access to network resources and cardholder data.” It is one of the most important requirements, and also one of the most difficult to implement effectively.

Monday, September 18, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (891)/Comments (0)/
Categories: Security Services
The Rise of Industrial Ethernet and Why It Matters

The Rise of Industrial Ethernet and Why It Matters

We’ve been discussing the increase in cybersecurity threats faced by the energy sector, particularly oil and gas companies using network-connected devices to monitor and control infrastructure and equipment. According to a recent study by the Ponemon Institute, this operational technology (OT) environment generally lacks adequate security measures, and thus poses a greater risk than the information technology (IT) environment.

Monday, April 10, 2017/Author: The SageNet Team/Number of views (1189)/Comments (0)/
Categories: Security Services
Cybercriminals Have Set Their Sights on the Energy Sector

Cybercriminals Have Set Their Sights on the Energy Sector

The Associated Press recently reported that oil and gas companies, including some of the largest in the industry that operate along the Gulf Coast near Houston, have become a popular target for hackers. Many companies are using decades-old technology and unprotected wireless signals to connect computer networks to equipment, leaving refineries, pipelines, and chemical plants vulnerable to attack. In fact, the Houston Chronicle reported 350 security incidents and uncovered nearly 900 security flaws at energy companies between 2011 and 2015.

Tuesday, March 28, 2017/Author: The SageNet Team/Number of views (1184)/Comments (0)/
Categories: Security Services
SIEMonster: A Complete SIEM Solution That’s Free and Open Source

SIEMonster: A Complete SIEM Solution That’s Free and Open Source

As IT infrastructures have become more sophisticated and complex, so have the cyberattacks that attempt to infiltrate them. Advanced persistent threats (APTs) are capable of sneaking past defenses and operating undetected for weeks or even months. There are often signs that an attack is taking place, but organizations lack effective tools for monitoring threats and correlating security event information, and in many cases just ignore the signs as false positives.

Monday, December 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (6592)/Comments (0)/
Categories: Security Services
9 Tips for Reducing the Risk of Ransomware

9 Tips for Reducing the Risk of Ransomware

Ransomware is a high-tech spin on the age-old art of the shakedown. Cybercriminals use malware to encrypt data on a victim’s systems, then demand a ransom to decrypt them. The crooks are betting on the fact that organizations rely heavily upon their data and will be willing to pay to regain access to the files.
Tuesday, July 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (2048)/Comments (0)/
RSS
12