paykasa bozdurma
Home > Support > Blog
Remote Code Execution Vulnerabilities Dominate the Security Headlines

Remote Code Execution Vulnerabilities Dominate the Security Headlines

On Nov. 8, Microsoft published a security advisory about a remote code execution vulnerability in Microsoft Office documents with Dynamic Data Exchange (DDE) fields. The advisory was related to three separate phishing campaigns containing attachments that used the DDE protocol to download and execute malicious code.

Wednesday, December 06, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (437)/Comments (0)/
Categories: Security Services
OilComm / FleetComm Highlights Solutions for Business Continuity

OilComm / FleetComm Highlights Solutions for Business Continuity

The SageNet team is getting ready to head to OilComm and FleetComm 2017, to be held Dec. 6 and 7 at the Marriott Westchase in Houston. The event was originally slated for Oct. 4 and 5, but was rescheduled due to the destruction caused by Hurricane Harvey. Many people in the oil and gas, maritime, commercial trucking, shipping, and logistics industries were impacted by the disaster, both personally and professionally.

Wednesday, November 29, 2017/Author: John Brader, VP & GM, Satellite Services/Number of views (527)/Comments (0)/
How Video Surveillance Can Help Secure Oil and Gas Operations

How Video Surveillance Can Help Secure Oil and Gas Operations

In October 2016, climate change activists broke into flow stations in four states and turned off valves on five cross-border pipelines that move crude oil from Canada to the U.S. In April 2017, contractors inspecting the Dakota Access Pipeline found a burnt hole the size of a dime, the result of vandalism.

Monday, November 20, 2017/Author: Larry Jones, VP Energy & Industrial Sales/Number of views (446)/Comments (0)/
Categories: Security Services
Ransomware and the Vanishing Security of Anonymity

Ransomware and the Vanishing Security of Anonymity

There used to be a common belief, among cybersecurity professionals and business users alike, that you had to have something of value on your network for hackers to come after you. This is true to some extent, although many people think of value as money and only worry about financial data. Some also recognize the value of intellectual property, and there’s increasing awareness of the black-market value of personally identifiable information.

Thursday, November 09, 2017/Author: David Wynne, Cybersecurity Engineer/Number of views (483)/Comments (0)/
Categories: Security Services
Web Application Firewalls Take Some of the Pressure Off App Dev Teams

Web Application Firewalls Take Some of the Pressure Off App Dev Teams

Various studies have shown that it costs 30 to 60 times more to remove a security vulnerability from a production application than it does to address the vulnerability during the design phase. Nevertheless, many organizations fail to incorporate security into every phase of the software development lifecycle (SDLC). Creating an SDLC for operational purposes is hard enough, but add security gates to the complexity and the wheels often fall off.

Monday, November 06, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (460)/Comments (0)/
Categories: Security Services
RSS
First 45678910111213 Last