Digital payments are the future of commerce, but security concerns have created a major barrier to their popularity. A study of businesses conducted by the influential PCI Security Standards Council found that 67% of respondents cited a lack of visible security options as a reason for not adopting a digital payments service.
Vulnerability management is the process of identifying, evaluating, prioritizing, remediating and reporting on security vulnerabilities in web applications, computers, mobile devices and software.
Just before the holidays, Citrix announced that their Citrix Application Delivery Controller (ADC) and Citrix Gateway are prone to a vulnerability which can allow remote unauthenticated attackers to execute code on vulnerable gateways. This led to a wave of alarming headlines about “80,000 firms” being exposed to hacking due to this flaw.
Security logs can be kept by the system itself or various applications that aim to provide security or enhance the efficiency of already installed security software. Read our article to learn more about them and for how long you should keep them.
We are pleased to announce that Redscan has been nominated in six categories at the 2020 Cybersecurity Excellence Awards – and we would really value your vote! The Cybersecurity Excellence Awards recognise companies, products and professionals that demonstrate excellence, innovation and leadership in information security.
Each day, we depend on energy for almost every kind of activity imaginable. Energy is required to keep lights on, enable transportation around the world, allow hospitals to operate, power the internet, and much more. Also termed the Oil and Gas sector, it’s considered a critical infrastructure sector by most nations around the world. This is because a loss of energy can cause a debilitating impact on the quality of human life.
January 1 ushers in a new year, a new decade, and new challenges—as well as new dimensions and re-ordering of existing challenges. Reciprocity’s Team of GRC Experts share likely developments, trends to watch out for, and how your organization can navigate Information Security Risk, & Compliance in 2020. With foresight, an organization can proactively take steps to address the challenges of the future.