Patching the Shoplift Bug: What You Should Be Doing
If you haven’t patched this vulnerability, you should. By: Chase PalmerIn early 2015, Magento found a vulnerability known as Shoplift Bug and released a patch for it. Unfortunately, many businesses...
View ArticleHow do Merchant Levels Determine PCI Compliance?
Learn more about merchant levels and how they affect PCI requirements. Did you know that merchants have different PCI requirements depending on their level? Did you know there are different levels of...
View ArticleThe Dangers of the Dirty Cow Vulnerability: Should You Be Worried?
Learn more about this vulnerability present in Linux systems and Android phonesBy: Steve SnelgroveSo you may have heard about the Dirty Cow vulnerability, but what kind of danger does it actually pose?...
View ArticleWhat Healthcare Should Know about HIPAA Penetration Testing
Does your healthcare organization do penetration testing? If not, you probably should. Read our latest white paper, What Healthcare Needs to Know about Penetration Testing.Did you know that...
View ArticleWhat are Service Provider Levels and How Do They Affect PCI Compliance?
Service providers’ PCI requirements can be different, depending on their levels. If you’re a service provider, you may have some different PCI requirements based on what level you are. PCI requirements...
View Article7 PCI Compliance Tips for Small Businesses
Learn some easy solutions to your security problems. By: Zach WalkerWhen it comes to PCI compliance, small businesses have their own unique struggles with securing their data. While smaller businesses...
View ArticleSecurityMetrics Audit for SANS Top 20 Critical Security Controls for Cyber...
Learn more about how your organization can fight cyberattacks. Can your business withstand a cyberattack? How sure are you?With the SANS institute, the Center for Internet Security created a list of...
View ArticleSecurityMetrics NIST 800-30 Risk Assessment
Use a framework when making your risk assessment. Do you know where your business is struggling in security? Are you compliant with all government and financial mandates? Do you know where to get...
View ArticleGetting Compliant with PCI Requirement 1: The Basics in Managing Your Firewall
What do you know about your firewall? Whether you’re new to PCI DSS, or have done it for several years now, you’re likely familiar with the 12 requirements. PCI Requirement 1 deals with setting up and...
View Article5 PCI Compliance Tips for Enterprise Organizations
Learn how to get your organization PCI compliant. By: George MateakiWhen it comes to PCI compliance, enterprise organizations have their own unique challenges in managing data security.One problem...
View ArticleTypes of Penetration Testing: The What, The Why, and The How
Learn what types of penetration testing methods your business may need. By: Chad HortonDid you know that a penetration test can result in very different findings depending on how much information the...
View ArticleTakeaways from PCI DSS 2016 Data Breach Trends
Let’s see what we can learn from this year’s data breaches. Read our data visualization: 2016 PCI DSS Data Breach Trends.2016 has seen a fair amount of data breaches, large and small, but are there...
View ArticleSecuring Mobile Devices with Mobile Encryption
Learn how encryption can protect the data on your mobile devicesBy: George MateakiWith the rise in mobile devices, it makes sense that more businesses are using mobile devices to process, store, and...
View ArticlePCI Requirement 2: How to Get Compliant
Learn more about Requirement 2 and getting your systems PCI compliant. By: Brand BarneySecurity AnalystCISSP, QSAPCI Requirement 2 involves securing your systems. This includes things like passwords,...
View ArticleA Snapshot of the 2017 SecurityMetrics Guide to HIPAA Compliance: The Status...
How did healthcare do with HIPAA in 2016? Read our 2017 SecurityMetrics Guide to HIPAA Compliance.By: Brand BarneySecurity AnalystCISSP, QSA2016 has seen many reported data breaches, many which were...
View ArticleSAQ A: What to Know, and What to Do
Learn what’s required to fill out SAQ A. By: Jen StoneSecurity AnalystCISSP, QSATo become PCI compliant, your bank might allow you to fill out a Self-Assessment Questionnaire, but there are different...
View ArticleDifferent Types of Penetration Tests For Your Business Needs
What area of your business would benefit the most from a penetration test? By: Chad HortonPenetration Testing ManagerCISSP, QSAPenetration testing is a form of ethical hacking that simulates attacks on...
View Article6 Steps to Making an Incident Response Plan
Learn how to get started on creating your own incident response plan. David EllisDirector of Forensic InvestigationsCISSP, PFI, QSAWhat do you do if you get hacked? If you learn that you’ve been...
View ArticlePCI DSS Requirement 3: What You Need to be Compliant
Learn how to fulfill PCI Requirement 3. By: Jen StoneSecurity AnalystQSA, CISSPAre you compliant with PCI DSS Requirement 3? This requirement involves protecting card data storage.Here are some things...
View ArticleSAQ A-EP: The What and the How
Learn what businesses qualify for SAQ-EP. By: Michael SimpsonPrincipal Security AnalystQSA, CISSPSAQ A-EP merchants are e-commerce merchants who partially outsource their e-commerce payment channel to...
View Article