Talk With an Expert

Botnet Tracking Tools

Botnet Tracking Tools (PDF, 3.01MB)Published: 14 Aug, 2014
Created by
Pierce Gibbs

With the Target Corporation breach as the main example, the last year has seen several POS systems compromised by bad actors. In many cases, these environments were PCI-DSS compliant. If the information security standard organization's use for securing POS systems isn't achieving the desired goal of stopping, or reducing, the impact of a data breach, something must be done - an 'Offense must inform Defense Approach'. Thus, this paper provides a comprehensive overview of the common POS environments, bad actor attack methods, and a mapping of data-driven best practices to the Council on CyberSecurity's 20 Critical Security Controls for Effective Cyber Defense.