PCI Compliance V4.0: Is your Business Ready?
Control Gap's Robert Spivak had a follow up session with David Goodale from www.merchant-accounts.ca to talk about some of the major impacts that PCI...
Welcome to This Week’s [in]Security. PCI Mobile Payments, FAQs, Training, Magecart & fraud. More on the FTX and Twitter metldowns. New breaches: Woosh, Thales. New Ransomware: Vanuatu, Ontario EMS. Downs, Privacy: Spyware, Surveillance, Siri. Laws & Regs - Canada: C-11&18, Blocking online news. US: KOSA, Google, Autopilot. World: Digital Red Cross, Hack-back, Crypto AML. Standards: NIST on CVSS, Networks, Trustworthy Secure Systems, and three drafts, leap second. Defense - Resources. Tools & Techniques. Vulnerabilities - Patching: Windows, BitBucket. Significant: Roundup, PunyCode, SMS 2FA, F5. Also: Bulletproof TLS, infrastructure. Cybercrime - active campaigns, MFA-fatigue, crime & enforcement, nation states and mercenaries. Other Risks, Mastodon, AI, Disinformation, Health, Safety, Environment, Economy. Russia v. Ukraine. Innovation: Quantum, AI. And more.
News and announcements relating to Payment Security, PCI, Card Brands, Payments, Payment Malware and Fraud, and Payment Related Compliance.
Covering breaches, leaks, data exposures, ransomware (as potential breach), and their fallout.
Articles about privacy related news, risks, and trends.
News about laws, regulations, platform rules, and standards affecting security, privacy, technology, and public interest.
Covering developments and opportunities that may help improve security.
Articles about newly discovered vulnerabilities and research.
News covering active trends, alerts, events.
Articles covering other types of risks.
News and announcements relating to Russia's invasion of Ukraine.
A variety of scientific, technical, historical, and more light-hearted news.
Control Gap's Robert Spivak had a follow up session with David Goodale from www.merchant-accounts.ca to talk about some of the major impacts that PCI...
This is a continuation of the Sage 300 case study series where we explore the process of discovering and developing exploits for six (6) different...
This is a continuation of the Sage 300 case study series where we explore the process of discovering and developing exploits for six (6) different...