Home > Support > Blog
Do You Have the Resources to Effectively Secure the IoT and the Cloud?

Do You Have the Resources to Effectively Secure the IoT and the Cloud?

The cybersecurity skills gap is rapidly getting wider, according to a new report from the Information Systems Security Association and Enterprise Strategy Group. More than half (51 percent) of organizations reported a “problematic shortage” of cybersecurity skills in 2018, up from 45 percent in 2017. This skills shortage is increasing the workload of existing staff, according to 63 percent of cybersecurity professionals.

Tuesday, February 20, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (505)/Comments (0)/
Categories: Security Services
What You Need to Know about PCI 3.2

What You Need to Know about PCI 3.2

The latest version of the Payment Card Industry Data Security Standard (PCI DSS) – PCI 3.2 – was recently introduced. PCI DSS is a global data security standard covering the technical and operational requirements that must be followed by any organization that stores, processes and transmits cardholder data.

Wednesday, September 28, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1342)/Comments (0)/
Categories: Security Services
Gaining PCI Compliance with a Software-Defined Perimeter

Gaining PCI Compliance with a Software-Defined Perimeter

In a previous post we discussed how a software-defined perimeter (SDP) can improve the security of key resources in cloud and multitenant computing environments. As we prepare for implementation of the latest update of the Payment Card Industry Data Security Standard (PCI DSS), it is important to note that the SDP framework delivers significant compliance capabilities.

Wednesday, September 21, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1926)/Comments (0)/
Categories: Security Services
Skimming Isn’t the Only Threat to Point-of-Sale Systems

Skimming Isn’t the Only Threat to Point-of-Sale Systems

In recent posts, we have been discussing the problem of point-of-sale (POS) skimmers — devices that thieves add to POS terminals in order to capture payment card numbers, PINs and other sensitive information. Skimmers can be installed in seconds and look almost identical to POS terminals, making them difficult to detect. Skimming at the gas pump is a particular problem for convenience stores and fuel retailers.

Thursday, May 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1740)/Comments (0)/
Categories: Security Services
RSS