paykasa bozdurma
Home > Support > Blog
The Most Valuable Alert: A Security Analyst’s Perspective

The Most Valuable Alert: A Security Analyst’s Perspective

When setting up monitoring, many people look at the IT assets inside the organization and set up alerts to identify attackers coming after those precious resources. It’s certainly important to be alerted when, say, an unknown user is being added to a Domain Administrator group. It’s a serious threat that’s easy to detect and address.

Tuesday, May 08, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (192)/Comments (0)/
Categories: Security Services
A Security Expert Explains the Top Password Pitfalls

A Security Expert Explains the Top Password Pitfalls

Typically, when I speak to someone about passwords and how to improve them, the follow-up question to the instructional “do this” is inevitably “why?” So we’re going to start with “why certain passwords are bad” and then follow up in a few weeks with “what should we do about that?” This post will attempt to show you the pitfalls many passwords fall into, broken down into four main categories.

Tuesday, April 24, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (327)/Comments (0)/
Categories: Security Services
How to Break the Cyberattack Chain and Prevent a Security Breach

How to Break the Cyberattack Chain and Prevent a Security Breach

The SageNet Cybersecurity team has seen a recent trend in phishing attacks against organizations with Office 365. Using open source intelligence (OSINT) techniques, such as searching Google or LinkedIn, attackers are gathering email addresses of employees of the target organization and sending phishing emails from outside the organization. The goal of this campaign is to collect the Office 365 credentials of one or more employees.

Monday, April 02, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (281)/Comments (0)/
Categories: Security Services
Taking the Mystery out of Penetration Testing

Taking the Mystery out of Penetration Testing

New vulnerabilities and exploits in business-critical systems seem to pop up every hour. Over time, even the most secure and meticulous of environments can fall victim to lapses in security, such as privilege creep, mismanaged or unpatched systems, and vulnerabilities easily leveraged by a malicious user. Incorporating regular penetration tests into your security strategy can help harden the infrastructure and protect your organization from the tarnished reputation and high costs associated with a data breach.

Monday, March 05, 2018/Author: Mike Brown, Senior Cybersecurity Engineer/Number of views (297)/Comments (0)/
Categories: Security Services
Do You Have the Resources to Effectively Secure the IoT and the Cloud?

Do You Have the Resources to Effectively Secure the IoT and the Cloud?

The cybersecurity skills gap is rapidly getting wider, according to a new report from the Information Systems Security Association and Enterprise Strategy Group. More than half (51 percent) of organizations reported a “problematic shortage” of cybersecurity skills in 2018, up from 45 percent in 2017. This skills shortage is increasing the workload of existing staff, according to 63 percent of cybersecurity professionals.

Tuesday, February 20, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (284)/Comments (0)/
Categories: Security Services
RSS
12345678910 Last