Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PCI DSS 4.0 Requirements -Test Security Regularly and Support Information Security with Organizational Policies and Programs

The Payment Card Industry Data Security Standard (PCI DSS) has always been a massive security undertaking for any organization that has worked to fully implement its recommendations. One interesting aspect that seems to be overlooked is the focus on the Requirements, and while minimizing the testing necessities. Not only is testing part of the full title of the Standard, but it is formally memorialized in Requirement 11 of the Standard, “Test Security of Systems and Networks Regularly.”

Phishing Trends and Tactics: Q1 of 2023

In the world of cybersecurity, there are a few constants, one of the big ones being the fact that news, innovation, and threats move fast and are constantly evolving. It is important for security professionals to stay in the loop about major developments in cybercriminal activity and the cybersecurity industry. Fortra’s PhishLabs offer resources to learn about a variety of cybersecurity-related topics, including a blog that regularly features cybersecurity news.

Customers and Employees of Talcott Resolution Life Insurance Likely Lost Data to Recent Breach

Talcott Resolution Life Insurance is a newer company founded in 2018. The organization specializes in life insurance and annuity offerings. It's located in Windsor, Connecticut, and has an annual revenue of $1.6 billion. The organization is responsible for managing about one million insurance contracts currently, which is a serious concern since the company was recently breached. This data breach could lead to substantial customer losses if those involved don't react quickly enough.

PCI DSS Compliance in Healthcare

Data security has become an essential aspect of our lives and is more crucial than ever before. In the healthcare industry, organizations are entrusted with a plethora of sensitive information, including PHI, PII, and financial data. This renders them accountable for complying with both HIPAA and PCI regulations. Adherence to these regulations is paramount for safeguarding sensitive patient information from data breaches and cyber attacks.

3 Key Metrics to Include in Your Cybersecurity Risk Analysis

Every organization faces cyber risk. But that risk can vary by industry, business size, the regulatory environment, supply chain, and more. Understanding your security risk posture is essential for targeting your security budget and effective resource allocation. Conducting a risk assessment can assist you in this endeavor, but to gain optimal insights, you should also include a comprehensive cybersecurity risk analysis as part of this process.

How Trustwave Uses Workforce Skills Frameworks to Assemble Effective Cybersecurity Teams

Building and maintaining a strong, diverse, and technically effective cybersecurity workforce can prove difficult, but one method of simplifying this task is using a cybersecurity workforce skills framework to review the composition of an organization's current cybersecurity function.

Improving operational efficiency: the biggest challenge MSPs face

The growth of the managed service provider (MSP) business and its ability to increase profits depends primarily on one aspect: efficiency. However, a recent study points out that improving operational efficiency is the biggest challenge MSPs face in obtaining consistent growth and profitability. To tackle this, 66% believe that automating as many procedures as possible is a key IT operations issue for enterprises in 2023. Improvements in automation have become a top priority for MSPs.

Understanding QR Code Risks, Scams, Examples & Best Security Practices - Part 2

In Part 1: What is a QR Code? Its Usage, Vulnerability, Advantages, and Comeback Story, we outlined the usage of QR code adoption across different industries, types of QR codes available, its advantages and how QR code comeback and changed the digital landscape extensively. It’s been a while since we posted the first blog post and it’s time for an update on QR code.