PCI DSS – 5 Most Commonly Observed Control Failures

Blog Companies must pay attention to 5 most common control failures, or it will become challenging for them to be compliant to PCI DSS. Failure to maintain PCI DSS compliance could lead to fines, imposed business restrictions, and rejection of credit card processing facilities. Unfortunately, many companies have not had sufficient time to pressure-test their… Continue reading PCI DSS – 5 Most Commonly Observed Control Failures

Published
Categorized as Blogs

MineBridge Malware Puts Companies on High Alert | Threat Spotlight

Blog Whether you are a security analyst looking for technical information on how the MineBridge malware works or an information security manager seeking advise on how to protect your organization from the malware, you are at the right place. Threat actors are in constant search for innovative techniques to evade detection and inject malware onto… Continue reading MineBridge Malware Puts Companies on High Alert | Threat Spotlight

Published
Categorized as Blogs

Do You Need to Adhere to PCI PIN Security Requirements?

Blog Few writings around the PCI PIN compliance subject illustrate whether a company needs to adhere to the PCI PIN security requirements. In principle, any organization across the cardholder PIN processing lifecycle must comply to PCI PIN standards. Here is helping you understand if you must. Scope of PCI PIN Compliance Generally, companies that must… Continue reading Do You Need to Adhere to PCI PIN Security Requirements?

Published
Categorized as Blogs

How Can CISOs Easily Adopt Zero-Trust Security?

Blog CISOs might not think that the Zero-Trust security is the fundamental model to secure their environment. Although, during these uncertain times, it is the imperative. At first glance, the fundamentals of zero trust security would not seem pretty useful for its adoption. Architecture. Principles. Benefits. Transformation. What use could these basic insights have for… Continue reading How Can CISOs Easily Adopt Zero-Trust Security?

Published
Categorized as Blogs

How to Detect and Prevent DNS Hijacking?

Blog DNS monitoring has never been more essential for a number of reasons, especially when DNS attacks cost companies at least 2 million dollars annually. IT and Network Operations Center (NOC) teams must realize that Domain Name System (DNS) attacks will become commonplace. With a diverse DNS security threat landscape, financial services, telecom, ecommerce companies… Continue reading How to Detect and Prevent DNS Hijacking?

Published
Categorized as Blogs

GDPR Compliance and Significance of Securing PII

Blog Why is it crucial to secure Personally Identifiable Information (PII)? Today, data has gained a prominent place in business operations. Most organizations collect, store, process, and (or) transmit Personally Identifiable Information (PII) of their customers. Increased usage of PII has been attracting threat actors to exploit vulnerabilities, steal sensitive information, and sell it on… Continue reading GDPR Compliance and Significance of Securing PII

Published
Categorized as Blogs Tagged

Secure organization’s data with Managed Detection and Response (MDR) for remote workers

Amid the outbreak of COVID-19 pandemic (novel coronavirus), global organizations took the regime of remote working to ensure Business-As-Usual (BAU). Many organizations enabled their employees to access business-critical data outside secured networks as per CIA triad (Confidentiality, Integrity, and Availability of sensitive information). When tons of sensitive information gets transferred across untrusted networks, and personal… Continue reading Secure organization’s data with Managed Detection and Response (MDR) for remote workers

Published
Categorized as Blogs

Insider Threat: Human Vulnerabilities Resulting in Cyber Attacks

Blog More than 34% of companies around the globe suffer from insider threats every year, costing an average of $8.76 million to each company. Insider threat/ insider attack are cyber menaces, which originate from inside an organization. These threats come from employees, ex-employees, business contractors, or vendors with valid access to an organization’s internal networks.… Continue reading Insider Threat: Human Vulnerabilities Resulting in Cyber Attacks

Published
Categorized as Blogs

Importance of Log monitoring and Threat Landscape

Blog Two years ago, hackers attacked the US-based credit reporting agency Equifax, resulting in data of over 150 million customers being exposed. Equifax had to pay a huge price for this breach. Apart from the inevitable reputational damage that the breach caused, the company has reportedly reached a settlement with some US federal and state… Continue reading Importance of Log monitoring and Threat Landscape

Published
Categorized as Blogs
SISA’s Latest
close slider

Webinar

Infosec Report

The current query has no posts. Please make sure you have published items matching your query.