Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Deep dive on PCI DSS 4.0 API Security Requirements

The Payment Card Industry Data Security Council created PCI DSS as the global standard for protecting payment data. The PCI DSS is the compliance stick to which entities that transmit, store, handle, or accept credit card data of any size must adhere. Recently, PCI DSS came up with version 4.0. In this blog, we delve deeper into the new version and explain why securing APIs is critical for PCI DSS compliance and how organizations can do so.

Global CISO Dawn-Marie Hutchinson joins Xalient as Non-Executive Director

Xalient, a global IT consulting and managed services company specialising in cybersecurity, identity and network transformation has today announced the appointment of Dawn-Marie Hutchinson as Non-Executive Director. This appointment comes at a pivotal time, as the company continues to accelerate its cybersecurity and zero-trust offering in line with its international growth strategy.

Forward Networks Achieves SOC 2 Type II Compliance, Reiterating Commitment to Data Security and Transparency

Forward Networks announced today that it has successfully achieved System and Organization Controls (SOC) 2 Type II Compliance attestation conducted by an independent third party. The completion of the audit demonstrates Forward Networks' long-term commitment to providing its customers transparency, privacy, and data security. Forward Networks achieved SOC 2 Type I Compliance in July of last year.

Is decentralized Internet the future?

The Internet has come a long way since its invention, and activities on the Internet have become an important part of our daily lives. However, the traditional approach to Internet hosting has remained centralized and the entire technology industry is concerned about the power of data concentrated in the hands of the leading tech companies, including Google, Amazon, Microsoft, etc. Therefore, in the last few years, the decentralization process has become a new trend offering improved security from cybercrimes, privacy, and availability of online services. So, is decentralized Internet the future?

Unleashing Innovation: The Dynamics of SaaS Development Agencies

In today's rapidly evolving business landscape, agility and scalability are paramount. Traditional software models often struggle to meet the dynamic demands of modern enterprises. Enter Software as a Service (SaaS), a game-changing paradigm that offers flexible, subscription-based solutions accessible via the cloud. SaaS applications empower businesses to streamline operations, enhance productivity, and adapt to market shifts with ease.

Hunting 'unknown-unknowns' in your attack surface

Ever lost sleep over possible hidden attack routes lurking in your organization’s attack surface? You’re not alone. The concept of ‘unknown-unknowns’ is a recurring nightmare for many IT professionals – but there are ways to mitigate the risks. We’ll explore the problem of unknown-unknowns and provide some practical strategies to help your organization uncover these hidden threats.

Navigating AI and Cybersecurity: Insights from the World Economic Forum (WEF)

Cybersecurity has always been a complex field. Its adversarial nature means the margins between failure and success are much finer than in other sectors. As technology evolves, those margins get even finer, with attackers and defenders scrambling to exploit them and gain a competitive edge. This is especially true for AI.

EP 50 - Adversarial AI's Advance

In the 50th episode of the Trust Issues podcast, host David Puner interviews Justin Hutchens, an innovation principal at Trace3 and co-host of the Cyber Cognition podcast (along with CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe). They discuss the emergence and potential misuse of generative AI, especially natural language processing, for social engineering and adversarial hacking.