Consumers care about their data: Learn how to automate privacy and compliance efforts

Consumer data compliance and privacy are growing in importance. Learn how to automate compliance efforts here.
The post Consumers care about their data: Learn how to automate privacy and compliance efforts appeared first on TechRepublic.
Continue reading Consumers care about their data: Learn how to automate privacy and compliance efforts

PCI DSS 4.0 changes help organizations protect payment card data

The PCI Security Standards Council (PCI SSC) published version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS is a global standard that provides a baseline of technical and operational requirements designed to protect account data. This Help … Continue reading PCI DSS 4.0 changes help organizations protect payment card data

Secure transactions top retailers’ wish lists this holiday season

We are amid the busiest retail season of the year, with U.S. retail sales expected to grow 10.5% to a record $859 billion this holiday season compared to 2020. The number of transactions is increasing, but so is the number of hackers who are targeting … Continue reading Secure transactions top retailers’ wish lists this holiday season

Zimperium partners with PCI SSC to help secure payment data on mobile apps and devices

Zimperium announced it has joined the PCI Security Standards Council (PCI SSC) as a new Participating Organization. Zimperium will work with the PCI SSC to help secure payment data worldwide on mobile apps and devices. It will also leverage its threat … Continue reading Zimperium partners with PCI SSC to help secure payment data on mobile apps and devices

Fugue adds Kubernetes security checks for securing IaC and cloud runtime environments

Fugue announced support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified platform for securing infrastructure as code (IaC) and cloud runtime environmen… Continue reading Fugue adds Kubernetes security checks for securing IaC and cloud runtime environments

VMware announces security innovations to deliver zero trust architecture across cloud and app environments

Today’s modern enterprises are facing an evolving threat landscape and increasingly sophisticated cyberattacks. They require security that is both built-in and built differently. More than 30,000 customers trust VMware to help protect their enter… Continue reading VMware announces security innovations to deliver zero trust architecture across cloud and app environments

Fugue IaC platform empowers cloud teams to eliminate security gaps

Fugue announced Fugue IaC, a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies. Powered by a Unified Policy Engine, Fugue IaC saves cloud teams significant time and ensures consiste… Continue reading Fugue IaC platform empowers cloud teams to eliminate security gaps

NeuVector launches configuration assessment tool for enterprise container security

NeuVector released its configuration posture management and deployment assessment tool for Kubernetes resources. The new tool – available as part of the NeuVector container security platform – enables customers to immediately and automatically identify… Continue reading NeuVector launches configuration assessment tool for enterprise container security

Fivetran Business Critical delivers enterprise-grade security to address sensitive data requirements

Fivetran announced the addition of a new product tier that offers a set of key security-related features for enterprises: Fivetran Business Critical. Building on its ability to fully manage data pipelines, Fivetran now offers enterprises the highest le… Continue reading Fivetran Business Critical delivers enterprise-grade security to address sensitive data requirements

Payment Security: Understanding the Four Corner Model

Introduction Online shopping digital payment transactions may seem quite simple, but in reality, just one single transaction sets off multiple, long-chain reactions. The Payment Card Industry comprises debit cards, credit cards, prepaid, e-purse/e-wall… Continue reading Payment Security: Understanding the Four Corner Model