Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

PCI DSS Requirement 12 - Changes from v3.2.1 to v4.0 Explained

Welcome to our latest blog post where we delve into the intricacies of the Payment Card Industry Data Security Standard (PCI DSS) Requirement 12. This requirement, which focuses on maintaining an Information Security Policy, is a cornerstone of the PCI DSS framework. It outlines the need for comprehensive policies and programs that govern and provide direction for the protection of an entity’s information assets.

CISA: Healthcare Organizations Should Be Wary of Increased Ransomware Attacks by ALPHV Blackcat

A joint cybersecurity advisory published last week discusses ransomware attack impacts on healthcare, along with ALPHV’s attack techniques, indicators of compromise (IoCs) and proper response actions. ALPHV is a big enough problem that Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Department of Health and Human Services (HHS) all are getting together to put healthcare organizations on notice.

Why misconfigurations continue to plague public cloud network services and how to avoid them?

Oren Amiram, Director of Product at AlgoSec, explains why misconfigurations continue to plague public cloud network services and how organizations can address these shortfalls with AlgoSec Cloud. Cloud security as a strategy is constantly evolving to meet the needs of organizations for scale, agility, and security. If your organization is weighing the merits of the use of public cloud versus private cloud, here are a few facts to keep in mind. Data shows that the public cloud is the preferred choice.

Six Python security best practices for developers

Python is a fast, platform-agnostic, and easy-to-learn programming language that is suited for beginners and experienced developers alike. Ever since its first release in 1991, Python has had a constant presence in the computer world and has become a go-to language thanks to its easy-to-understand code and versatility. Today, Python can boast a wide array of libraries and frameworks, and they are the cornerstone of fast and easy Python programming—the so-called Pythonic way of development.

How LDAP is used in Active Directory

The primary protocol employed within Microsoft’s Active Directory(AD) is Lightweight Directory Access Protocol (LDAP). While LDAP serves as a fundamental component in AD, its application extends beyond, enabling user authentication in various tools and client environments. This includes Red Hat Directory Servers on UNIX systems and OpenLDAP, an open-source application used on Windows platforms.

Efficiency at Its Best: Exploring the Advantages of Accounts Payable Outsourcing Services

The business world is rapidly evolving, and the rise of accounts payable outsourcing services is a testament to this transformation. As organizations seek to streamline their operations and focus on their core competencies, many are turning to these services for their myriad benefits. This article delves into the advantages of accounts payable outsourcing services, dissecting their contribution to time savings, scalability, process improvement, and data security.

How Face Recognition Vendor Test is being processed

In today's world, security is a top priority for governments around the globe. With the rise of terrorism and conflicts, it is important to have measures in place that can prevent threats from entering a country. This is why face recognition systems are gaining popularity as they have the capability to make our world safer by quickly identifying individuals who may pose a danger. To ensure the effectiveness of these systems, a comprehensive program called the Face Recognition Vendor Test (FRVT) evaluates and measures advancements in this technology. Here is how it operates.