Product showcase: Protect digital identities with Swissbit’s iShield Key Pro

In today’s fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability…. Continue reading Product showcase: Protect digital identities with Swissbit’s iShield Key Pro

Microsoft Charged for Violating EU Antitrust Rules by Bundling Teams With Other Office Products

The EU claims that by bundling Teams with other Microsoft Office tools, the company restricts competition in the market for communication apps. Continue reading Microsoft Charged for Violating EU Antitrust Rules by Bundling Teams With Other Office Products

How do payment facilitators like Stripe handle the PCI DSS requirement to periodically inspect POI devices?

Payment facilitators like Stripe provide card payment terminals to their customers. These devices must be periodically inspected, per requirement 9.5.1.2. How does the payment facilitator handle this, given that they don’t have physical ac… Continue reading How do payment facilitators like Stripe handle the PCI DSS requirement to periodically inspect POI devices?

Some Open Source Software Licences are Only ‘Open-ish,’ Says Thoughtworks

A number of open source tech tools have moved towards commercial licences. Thoughtworks says this creates “big headaches” for IT, who are scrambling to maintain compliance and find replacement tools. Continue reading Some Open Source Software Licences are Only ‘Open-ish,’ Says Thoughtworks

Pressure mounts on CISOs as SEC bares teeth with legal action

A Panaseer investigation into organizations’ annual 10-K filings reported to the SEC shows that from January-May 2024, at least 1,327 filings mentioned NIST – a key indicator that cybersecurity posture is present in a filing. This compares to just 110 … Continue reading Pressure mounts on CISOs as SEC bares teeth with legal action

From passwords to passkeys: Enhancing security and user satisfaction

In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and improves user experience by simplifying the login process. Lamb also addresses the … Continue reading From passwords to passkeys: Enhancing security and user satisfaction

PCI Compliance for Contract Management Software with User-Entered Card Data

I’m evaluating a contract management software that claims PCI compliance for my CC data. However, I am going to use the software to issue contracts to my customers where they directly enter credit card information within contracts, which a… Continue reading PCI Compliance for Contract Management Software with User-Entered Card Data

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps revolutionized navigation, process mapping can revolutionize how you understand a… Continue reading How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

Enhancing security through collaboration with the open-source community

In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks and benefits of collaborating with the open-source community … Continue reading Enhancing security through collaboration with the open-source community

Meta and Apple Violated the Digital Marketing Act, EU Charges

About a week after the ruling against Apple, the European Commission ruled Meta’s ‘pay or consent’ model of offering subscriptions as an alternative to ads on Instagram or Facebook is against the terms of the DMA. Continue reading Meta and Apple Violated the Digital Marketing Act, EU Charges