Talk With an Expert

Botnet Tracking Tools

Botnet Tracking Tools (PDF, 3.01MB)Published: 14 Aug, 2014
Created by:
Pierce Gibbs

With the Target Corporation breach as the main example, the last year has seen several POS systems compromised by bad actors. In many cases, these environments were PCI-DSS compliant. If the information security standard organization's use for securing POS systems isn't achieving the desired goal of stopping, or reducing, the impact of a data breach, something must be done - an 'Offense must inform Defense Approach'. Thus, this paper provides a comprehensive overview of the common POS environments, bad actor attack methods, and a mapping of data-driven best practices to the Council on CyberSecurity's 20 Critical Security Controls for Effective Cyber Defense.