Latest Posts

Popular data security articles: the most-read PCI DSS compliance and data security posts.

How to Conduct a Cloud Security Assessment

A cloud security assessment is an assessment that tests and analyzes cloud infrastructure to ensure the organization is protected from various security risks and threats on the cloud.

What are the PCI DSS Audit Requirements

The primary purpose of the PCI DSS audit is to validate an organization's ability to protect cardholder data and all systems that interact with payment transactions.

Managing Cyber Risk in the Age of Cloud Computing

The cloud delivers game-changing capabilities but also surfaces new cyber risks requiring an evolved security perspective. However, as more sensitive data and critical systems move to the cloud, businesses must adapt their cybersecurity strategies to effectively manage emerging risks.

PCI Compliance Recommendations for Mail and Fax Orders

Many orders still flow through fax or mail payment channels and, like all cardholder data, must be handled and secured by PCI DSS.

PCI Requirements For Storing Credit Card Information

PCI-DSS requirements state that cardholder data may only be retained for a legitimate legal, regulatory, or business reason. In other words, if you don't need cardholder data, you shouldn't store it.

How to Keep Credit Card Over Phone Orders PCI Compliant

The transaction flow for phone orders can have multiple configurations, and PCI DSS requirements must be considered in each type of configuration.

External Penetration Testing Checklist

External pen testing checklist helps system administrators identify and calibrate unused ports, additional services, headers, troubleshooting services, and configurations of firewall rules.

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!