Latest Posts with cybersecurity tag

cybersecurity

299 Articles 2 Followers


PCI DSS: Recent Breaches

23 Jul 2020 3 minute read 0 comments bosluistepel

In this article, we will examine some fairly recent PCI DSS data breaches to highlight common problems that caused them as well as how to avoid them. British Airways British Airways confirmed a data breach on 7 September 2018 affecting sensitive, per...

Twitter hackers employing ‘peel chains’ to launder the Bitcoin bounty

23 Jul 2020 2 minute read 0 comments fklivestolearn

They have been using the technique to move the laundered BTC to Peer-to-Peer (P2P) and Gambling Platforms More details have now emerged on the Cybersecurity incident that happened last week when social media giant Twitter saw Bitcoin (BTC) scammers h...

PCI DSS Requirement 12: Documentation and risk assessments

21 Jul 2020 1 minute read 0 comments bosluistepel

The 12th and final requirement for PCI compliance are to keep policies, procedures, and evidence relating to your company’s security practices documented. When a PCI audit is done with the help of an accredited PCI QSA (Qualified Security Assessor),...

PCI DSS Requirement 11: Conduct vulnerability scans and penetration tests

20 Jul 2020 1 minute read 0 comments bosluistepel

Due to defects and security issues on web servers, web browsers, email clients, computer software, operating systems, and server interfaces, your sensitive data could be exposed. Fulfilling requirement 6 of the PCI DSS regulations - installing securi...

PCI DSS Requirement 10: Implement logging and log management

17 Jul 2020 1 minute read 0 comments bosluistepel

The PCI DSS regulatory board found that in 2017, non-compliance with PCI DSS requirement 10 was the most common cause of data breaches. Log files only add real value if they are reviewed. System event logs are entries of information recording any and...

The 10 Worst Cybersecurity Strategies

16 Jul 2020 1 minute read 9 comments Matthew Rosenquist

Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who yo...

PCI DSS Requirement 9: Restrict physical access to workplace and cardholder data

15 Jul 2020 1 minute read 0 comments bosluistepel

Employees may think that physical security is only applicable outside of business hours. In fact, most types of data theft (for example social engineering attacks) occur during the course of a normal business day when the company's employees are too...

Cybersecurity Thought Leader Ranking for July 2020

14 Jul 2020 1 minute read 4 comments Matthew Rosenquist

I am excited to be recognized with such great cybersecurity though-leaders!  Now more than ever, cybersecurity is becoming a critical pillar to the proliferation of digital technology.  Trust in the devices and systems is crucial that people, compan...

U.S Army seek for a crypto tracking tool to help on cybercrime investigations.

14 Jul 2020 1 minute read 0 comments alberdioni8406

The U.S Government seems to get more involved in the world of Cryptocurrency now with the priority to fight against cybercrime, as they believe that Crypto could still be used to promote terrorism and money laundering. The U.S Army main unit inves...

PCI DSS Requirement 8: Assign a unique ID to each person with computer access

13 Jul 2020 1 minute read 0 comments bosluistepel

According to PCI DSS requirement 8, usernames or user IDs and passwords need to be adequately complex as well as unique. Under no circumstances should you use group or shared passwords. However, your system access security should not only be based on...