Latest Posts
Popular data security articles: the most-read PCI DSS compliance and data security posts.
Cloud Security
How to Conduct a Cloud Security Assessment
A cloud security assessment is an assessment that tests and analyzes cloud infrastructure to ensure the organization is protected from various security risks and threats on the cloud.
PCI DSS Audit
What are the PCI DSS Audit Requirements
The primary purpose of the PCI DSS audit is to validate an organization's ability to protect cardholder data and all systems that interact with payment transactions.
Cloud Security
Managing Cyber Risk in the Age of Cloud Computing
The cloud delivers game-changing capabilities but also surfaces new cyber risks requiring an evolved security perspective. However, as more sensitive data and critical systems move to the cloud, businesses must adapt their cybersecurity strategies to effectively manage emerging risks.
Mail & Fax Orders
PCI Compliance Recommendations for Mail and Fax Orders
Many orders still flow through fax or mail payment channels and, like all cardholder data, must be handled and secured by PCI DSS.
Credit Card
PCI Requirements For Storing Credit Card Information
PCI-DSS requirements state that cardholder data may only be retained for a legitimate legal, regulatory, or business reason. In other words, if you don't need cardholder data, you shouldn't store it.
Credit Card Over Phone Orders
How to Keep Credit Card Over Phone Orders PCI Compliant
The transaction flow for phone orders can have multiple configurations, and PCI DSS requirements must be considered in each type of configuration.
Pentest
External Penetration Testing Checklist
External pen testing checklist helps system administrators identify and calibrate unused ports, additional services, headers, troubleshooting services, and configurations of firewall rules.
Want to stay up to date with the latest news?
We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!