paykasa bozdurma
Home > Support > Blog
How to Break the Cyberattack Chain and Prevent a Security Breach

How to Break the Cyberattack Chain and Prevent a Security Breach

The SageNet Cybersecurity team has seen a recent trend in phishing attacks against organizations with Office 365. Using open source intelligence (OSINT) techniques, such as searching Google or LinkedIn, attackers are gathering email addresses of employees of the target organization and sending phishing emails from outside the organization. The goal of this campaign is to collect the Office 365 credentials of one or more employees.

Monday, April 02, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (376)/Comments (0)/
Categories: Security Services
Do You Have the Resources to Effectively Secure the IoT and the Cloud?

Do You Have the Resources to Effectively Secure the IoT and the Cloud?

The cybersecurity skills gap is rapidly getting wider, according to a new report from the Information Systems Security Association and Enterprise Strategy Group. More than half (51 percent) of organizations reported a “problematic shortage” of cybersecurity skills in 2018, up from 45 percent in 2017. This skills shortage is increasing the workload of existing staff, according to 63 percent of cybersecurity professionals.

Tuesday, February 20, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (417)/Comments (0)/
Categories: Security Services
Remote Code Execution Vulnerabilities Dominate the Security Headlines

Remote Code Execution Vulnerabilities Dominate the Security Headlines

On Nov. 8, Microsoft published a security advisory about a remote code execution vulnerability in Microsoft Office documents with Dynamic Data Exchange (DDE) fields. The advisory was related to three separate phishing campaigns containing attachments that used the DDE protocol to download and execute malicious code.

Wednesday, December 06, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (447)/Comments (0)/
Categories: Security Services
Web Application Firewalls Take Some of the Pressure Off App Dev Teams

Web Application Firewalls Take Some of the Pressure Off App Dev Teams

Various studies have shown that it costs 30 to 60 times more to remove a security vulnerability from a production application than it does to address the vulnerability during the design phase. Nevertheless, many organizations fail to incorporate security into every phase of the software development lifecycle (SDLC). Creating an SDLC for operational purposes is hard enough, but add security gates to the complexity and the wheels often fall off.

Monday, November 06, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (478)/Comments (0)/
Categories: Security Services
Conquering PCI Section 10 with SageNet and SIEMonster

Conquering PCI Section 10 with SageNet and SIEMonster

On a yearly basis, all organizations that process or handle credit cards are required to validate their security controls based on the Payment Card Industry Data Security Standard (PCI DSS). Requirement 10 of the standard mandates that organizations “track and monitor all access to network resources and cardholder data.” It is one of the most important requirements, and also one of the most difficult to implement effectively.

Monday, September 18, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (699)/Comments (0)/
Categories: Security Services
RSS