Open Mobile Menu

Blog

Filed In: PCI DSS

PCI 101: Transaction Volumes and Validation Requirements

Chip Ross

Written By: Chip Ross

January 02, 2019

Views: 86

Regarding PCI compliance, all entities that store, process or transmit cardholder data are subject to the requirements of the PCI Data Security Standard (PCI DSS). Merchant or Service Provider Level, and how cardholder data is handled normally determine how an entity is required to validate compliance.

Read more.

Filed In: SOC 1/2

It’s Time to Use the Latest SOC 2 Trust Services Criteria, Are You Ready?

Matthew Cooper

Written By: Matthew Cooper

December 14, 2018

Views: 4547

Starting this weekend, all SOC 2 reports with review periods ending after December 15th, 2018 must be conducted using the American Institute of Certified Public Accountants’ (AICPA) April 2017 release of the Trust Services Criteria. This blog post describes the major changes to the criteria and provides some advice for using it to prepare for your next SOC 2 audit.

Read more.

Filed In: Network Security, Security Testing

Web Application Enumeration at Scale

Stephen Haywood

Written By: Stephen Haywood

December 07, 2018

Views: 988

When we conduct network penetration tests, we often find that the majority of accessible services are web applications. Often times, these web applications have administrative interfaces with weak/default passwords or have vulnerabilities that allow us to access sensitive data or even allow arbitrary execution of code.

Read more.