Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Which PCI SAQ Do I Need?

PCI DSS Self-Assessment Questionnaires (SAQs) are tools provided by the PCI Security Standards Council (PCI SSC) to help payment-card-processing merchants and service providers measure their own PCI compliance Payment Card Industry Data Security Standard (PCI DSS) Self-Assessment Questionnaires (SAQs). Which of the nine Payment Card Industry Data Security Standard (PCI DSS) Self-Assessment Questionnaires (SAQs) your organization needs to fill out and submit depends on several factors.

New AT&T Cybersecurity Managed Threat Detection and Response service

With access to more resources than ever before, cybercriminals are rapidly scaling their operations, making every organization a potential target for a cyberattack. And, they are constantly shifting their tactics to exploit new vulnerabilities and slip past perimeter-based controls undetected. Meanwhile, the longer a threat goes undetected in a network environment, the greater the potential for damage through a security breach, data loss, or business downtime and disruption.

How to Manage a Modern Cyber Security Strategy

Oliver Pinson-Roxburgh has been in cyber security for over 15 years. He is a self-professed security evangelist, and his love of everything cyber makes him one of the most knowledgeable experts in the industry today. This webinar looks into who the prime targets for cyber attacks are, and how to detect and resolve potential threats quickly and efficiently. We have a supporting article on our website, here all viewers will receive free access to our guide “SIEM: Build, Buy or Outsource”. This is Bulletproof’s third webinar of 2019.

Most Security Pros Think Recent GDPR Fines Won't Significantly Affect Policies

In July 2019, UK Information Commissioner’s Office (ICO) announced its intention to fine two companies for violating the European Union’s General Data Protection Regulation (GDPR). ICO began by disclosing its intention to penalize British Airways in the amount of £183 million (approximately $224 million) on 8 July.

Woman arrested after Capital One hack spills personal info on 106 million credit card applicants

The FBI has arrested a 33-year-old software engineer in Seattle as part of an investigation into a massive data breach at financial services company Capital One. Paige A. Thompson, also known by the online handle “erratic,” has been charged with one count of computer fraud and abuse, after an investigation uncovered that a hacker had broken into cloud servers run by Capital One and stole data related to over 100 million credit-card applications.

Learn to Avoid Life Sciences Data Access Pitfalls

Data drives the life sciences. Data supports the development of new products and enables agile decision making. But for a field so completely reliant on data, the industry is struggling to find methods to adequately handle that data. Ideally, there would be centralized repositories where data is accessible, safe, and organized regardless of the format or size. Instead, there are numerous data silos spread among the different contributors to a specific project.

When Metrics and Logs are Unified, Good Business Ensues

If you’re reading this, you likely know what a log is, and what a metric is. But sometimes there are questions on their differences, whether you really need both, and if you should use dedicated solutions to manage each type. The answers? Yes, you need both; yes, they should be unified. Logs and metrics, aka machine data, are complementary.