paykasa bozdurma
Home > Support > Blog
Do You Have the Resources to Effectively Secure the IoT and the Cloud?

Do You Have the Resources to Effectively Secure the IoT and the Cloud?

The cybersecurity skills gap is rapidly getting wider, according to a new report from the Information Systems Security Association and Enterprise Strategy Group. More than half (51 percent) of organizations reported a “problematic shortage” of cybersecurity skills in 2018, up from 45 percent in 2017. This skills shortage is increasing the workload of existing staff, according to 63 percent of cybersecurity professionals.

Tuesday, February 20, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (337)/Comments (0)/
Categories: Security Services
Ransomware and the Vanishing Security of Anonymity

Ransomware and the Vanishing Security of Anonymity

There used to be a common belief, among cybersecurity professionals and business users alike, that you had to have something of value on your network for hackers to come after you. This is true to some extent, although many people think of value as money and only worry about financial data. Some also recognize the value of intellectual property, and there’s increasing awareness of the black-market value of personally identifiable information.

Thursday, November 09, 2017/Author: David Wynne, Cybersecurity Engineer/Number of views (445)/Comments (0)/
Categories: Security Services
NIST Drafts an Update to Its Cybersecurity Framework

NIST Drafts an Update to Its Cybersecurity Framework

The term “perfect storm” refers to a confluence of events that makes a bad situation dramatically worse. It succinctly sums up the cybersecurity challenges organizations are facing today.

Tuesday, June 27, 2017/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (711)/Comments (0)/
Categories: Security Services
The Cyber Assault on Multisite Restaurants and What You Can Do

The Cyber Assault on Multisite Restaurants and What You Can Do

Several multisite restaurant chains have become the latest victims of point-of-sale (POS) security breaches in recent weeks. A large Mexican restaurant chain reported “unauthorized activity” on a system that processes payments. A fast-casual restaurant group found POS malware had been active on its systems for more than two months. A national chain of upscale restaurants and bars said its POS vendor had suffered a “sophisticated network intrusion that resulted in a security breach.”

Wednesday, May 31, 2017/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (699)/Comments (0)/
Categories: Security Services
Cybercriminals Have Set Their Sights on the Energy Sector

Cybercriminals Have Set Their Sights on the Energy Sector

The Associated Press recently reported that oil and gas companies, including some of the largest in the industry that operate along the Gulf Coast near Houston, have become a popular target for hackers. Many companies are using decades-old technology and unprotected wireless signals to connect computer networks to equipment, leaving refineries, pipelines, and chemical plants vulnerable to attack. In fact, the Houston Chronicle reported 350 security incidents and uncovered nearly 900 security flaws at energy companies between 2011 and 2015.

Tuesday, March 28, 2017/Author: The SageNet Team/Number of views (875)/Comments (0)/
Categories: Security Services
RSS
123