Quantcast
Channel: SecurityMetrics Blog
Browsing all 384 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Patching the Shoplift Bug: What You Should Be Doing

If you haven’t patched this vulnerability, you should.  By: Chase PalmerIn early 2015, Magento found a vulnerability known as Shoplift Bug and released a patch for it. Unfortunately, many businesses...

View Article


Image may be NSFW.
Clik here to view.

How do Merchant Levels Determine PCI Compliance?

Learn more about merchant levels and how they affect PCI requirements. Did you know that merchants have different PCI requirements depending on their level? Did you know there are different levels of...

View Article


Image may be NSFW.
Clik here to view.

The Dangers of the Dirty Cow Vulnerability: Should You Be Worried?

Learn more about this vulnerability present in Linux systems and Android phonesBy: Steve SnelgroveSo you may have heard about the Dirty Cow vulnerability, but what kind of danger does it actually pose?...

View Article

Image may be NSFW.
Clik here to view.

What Healthcare Should Know about HIPAA Penetration Testing

Does your healthcare organization do penetration testing? If not, you probably should.  Read our latest white paper, What Healthcare Needs to Know about Penetration Testing.Did you know that...

View Article

Image may be NSFW.
Clik here to view.

What are Service Provider Levels and How Do They Affect PCI Compliance?

Service providers’ PCI requirements can be different, depending on their levels. If you’re a service provider, you may have some different PCI requirements based on what level you are. PCI requirements...

View Article


Image may be NSFW.
Clik here to view.

7 PCI Compliance Tips for Small Businesses

Learn some easy solutions to your security problems.  By: Zach WalkerWhen it comes to PCI compliance, small businesses have their own unique struggles with securing their data. While smaller businesses...

View Article

Image may be NSFW.
Clik here to view.

SecurityMetrics Audit for SANS Top 20 Critical Security Controls for Cyber...

Learn more about how your organization can fight cyberattacks. Can your business withstand a cyberattack? How sure are you?With the SANS institute, the Center for Internet Security created a list of...

View Article

Image may be NSFW.
Clik here to view.

SecurityMetrics NIST 800-30 Risk Assessment

Use a framework when making your risk assessment.  Do you know where your business is struggling in security? Are you compliant with all government and financial mandates? Do you  know where to get...

View Article


Image may be NSFW.
Clik here to view.

Getting Compliant with PCI Requirement 1: The Basics in Managing Your Firewall

What do you know about your firewall? Whether you’re new to PCI DSS, or have done it for several years now, you’re likely familiar with the 12 requirements. PCI Requirement 1 deals with setting up and...

View Article


Image may be NSFW.
Clik here to view.

5 PCI Compliance Tips for Enterprise Organizations

Learn how to get your organization PCI compliant.  By: George MateakiWhen it comes to PCI compliance, enterprise organizations have their own unique challenges in managing data security.One problem...

View Article

Image may be NSFW.
Clik here to view.

Types of Penetration Testing: The What, The Why, and The How

Learn what types of penetration testing methods your business may need. By: Chad HortonDid you know that a penetration test can result in very different findings depending on how much information the...

View Article

Image may be NSFW.
Clik here to view.

Takeaways from PCI DSS 2016 Data Breach Trends

Let’s see what we can learn from this year’s data breaches.  Read our data visualization: 2016 PCI DSS Data Breach Trends.2016 has seen a fair amount of data breaches, large and small, but are there...

View Article

Image may be NSFW.
Clik here to view.

Securing Mobile Devices with Mobile Encryption

Learn how encryption can protect the data on your mobile devicesBy: George MateakiWith the rise in mobile devices, it makes sense that more businesses are using mobile devices to process, store, and...

View Article


Image may be NSFW.
Clik here to view.

PCI Requirement 2: How to Get Compliant

Learn more about Requirement 2 and getting your systems PCI compliant. By: Brand BarneySecurity AnalystCISSP, QSAPCI Requirement 2 involves securing your systems. This includes things like passwords,...

View Article

Image may be NSFW.
Clik here to view.

A Snapshot of the 2017 SecurityMetrics Guide to HIPAA Compliance: The Status...

How did healthcare do with HIPAA in 2016? Read our 2017 SecurityMetrics Guide to HIPAA Compliance.By: Brand BarneySecurity AnalystCISSP, QSA2016 has seen many reported data breaches, many which were...

View Article


Image may be NSFW.
Clik here to view.

SAQ A: What to Know, and What to Do

Learn what’s required to fill out SAQ A.  By: Jen StoneSecurity AnalystCISSP, QSATo become PCI compliant, your bank might allow you to fill out a Self-Assessment Questionnaire, but there are different...

View Article

Image may be NSFW.
Clik here to view.

Different Types of Penetration Tests For Your Business Needs

What area of your business would benefit the most from a penetration test? By: Chad HortonPenetration Testing ManagerCISSP, QSAPenetration testing is a form of ethical hacking that simulates attacks on...

View Article


Image may be NSFW.
Clik here to view.

6 Steps to Making an Incident Response Plan

Learn how to get started on creating your own incident response plan.  David EllisDirector of Forensic InvestigationsCISSP, PFI, QSAWhat do you do if you get hacked? If you learn that you’ve been...

View Article

Image may be NSFW.
Clik here to view.

PCI DSS Requirement 3: What You Need to be Compliant

Learn how to fulfill PCI Requirement 3. By: Jen StoneSecurity AnalystQSA, CISSPAre you compliant with PCI DSS Requirement 3? This requirement involves protecting card data storage.Here are some things...

View Article

Image may be NSFW.
Clik here to view.

SAQ A-EP: The What and the How

 Learn what businesses qualify for SAQ-EP. By: Michael SimpsonPrincipal Security AnalystQSA, CISSPSAQ A-EP merchants are e-commerce merchants who partially outsource their e-commerce payment channel to...

View Article
Browsing all 384 articles
Browse latest View live