PCI Point-to-Point Encryption Standard 3.0 released

The PCI Security Standards Council (PCI SSC) has updated the PCI Point-to-Point Encryption Standard (P2PE) and supporting program. PCI P2PE Version 3.0 simplifies the process for component and solution providers to validate their P2PE products for card… Continue reading PCI Point-to-Point Encryption Standard 3.0 released

The cybersecurity labor crunch highlights gaps in threat intelligence practices

In Greek mythology, Sisyphus, the King of Corinth, was punished by Hades by being forced to roll a huge stone up a hill, only to have it roll down again as soon as he reached the summit, and then have the process repeat ad infinitum. The Paradox of Sis… Continue reading The cybersecurity labor crunch highlights gaps in threat intelligence practices

The privacy and security trends that will shape 2020

Privacy concerns will ratchet up further around IoT and 5G. Even if the industry manages to secure the billions of IoT devices already deployed, they permeate so many aspects of life that it will be nearly impossible to keep personal and private inform… Continue reading The privacy and security trends that will shape 2020

The importance of proactive patch management

IT teams appreciate it when vendors or security researchers discover new vulnerabilities and develop patches for them. So do attackers. The same information that lets IT teams know where they may be vulnerable so they can take action, also lets attacke… Continue reading The importance of proactive patch management

2020 is prime for a global building cybersecurity standard

Buildings will account for 81% of all connected things in 2020, ushering in a new era of smart office buildings, schools, hospitals and more that will improve efficiencies for building management and provide a more comfortable experience for occupants…. Continue reading 2020 is prime for a global building cybersecurity standard

How to test employee cyber competence through pen-testing

Social engineering hacking preys on the vulnerabilities inherent in human psychology, so it’s vital for organizations to test employee cyber competence. Take the Nigerian 419 scam as an example – the scammer tries to convince the victim to help g… Continue reading How to test employee cyber competence through pen-testing

The 7 most dangerous digital technology trends

As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service capabilities to enrich the lives of people globally. But there is a catch. For… Continue reading The 7 most dangerous digital technology trends

It’s the most vulnerable time of the year

With the holiday season upon us, it can be all too easy to get swept up in the festivities. As soon as the Halloween hangover starts to finally wear off, you’re already preparing for Thanksgiving, and then it’s Black Friday and Cyber Monday and then th… Continue reading It’s the most vulnerable time of the year

Top 5 cybersecurity predictions for 2020

When it comes to cybersecurity, staying ahead of threats – rather than reacting to them – is critical. In a constantly evolving threat landscape, plugging holes – or designing one’s security posture for yesterday’s threats – just isn’t enough anymore. … Continue reading Top 5 cybersecurity predictions for 2020