7 Things You Can Do To Deal With The Recent Format Preserving Encryption (FPE) Compromise | blog,pci,cryptography | Control Gap
2 min read

7 Things You Can Do To Deal With The Recent Format Preserving Encryption (FPE) Compromise | blog,pci,cryptography | Control Gap

Barely a year after NIST approved Format-Preserving Encryption (FPE) based on AES they've issued a news release that one of the approved modes has...

Read More >
This Week's [in]Security - Issue 4 | insecurity | Control Gap
2 min read

This Week's [in]Security - Issue 4 | insecurity | Control Gap

Welcome to This Week’s [in]Security. We’ve collected and grouped together a selection of this week’s news and opinion links on security and privacy...

Read More >
This Week’s [in]Security – Issue 3
2 min read

This Week’s [in]Security – Issue 3

Welcome to This Week’s [in]Security. We’ve collected and grouped together a selection of this week’s news and opinion links on security and privacy...

Read More >
3 Ways 8-Digit BIN Ranges May Impact PCI Compliance
3 min read

3 Ways 8-Digit BIN Ranges May Impact PCI Compliance

New 8-digit Bank Identification Numbers (BIN) could complicate PCI truncation rules and create compliance headaches for those required to maintain...

Read More >
This Week’s [in]Security - Issue 2 | insecurity | Control Gap
3 min read

This Week’s [in]Security - Issue 2 | insecurity | Control Gap

Welcome to This Week’s [in]Security. We’ve collected and grouped together a selection of this week’s news and opinion links on security and privacy...

Read More >
This Week's [in]Security | insecurity | Control Gap
2 min read

This Week's [in]Security | insecurity | Control Gap

Welcome to our first issue of This Week's [in]Security. We've collected and grouped together a selection of this week's news and opinion links on...

Read More >
What The CIA WikiLeaks Dump Has In Common With PCI Compliance | blog,pci | Control Gap
1 min read

What The CIA WikiLeaks Dump Has In Common With PCI Compliance | blog,pci | Control Gap

In recent news, WikiLeaks exposed a huge trove of CIA documents. Journalists and bloggers will of course have a field day with this and the general...

Read More >
SHA-1 Is Dead!
2 min read

SHA-1 Is Dead!

History The SHA-1 cryptographic hash function was introduced in 1995. Weaknesses began to be discovered in 2005, and in 2011 NIST deprecated SHA-1. The...

Read More >
2017 Toronto Ride To Conquer Cancer | blog | Control Gap

2017 Toronto Ride To Conquer Cancer | blog | Control Gap

This year, Control Gap Inc. has donated $2,500 to The Enbridge Ride to Conquer Cancer which has been supporting the Princess Margaret Cancer Centre...

Read More >