Security Experts:

long dotted


PCI Security Standards Council published advice for building a security awareness program.
The Payment Card Industry (PCI) Security Standards Council has published guidance that provides merchants with payment security best practices for working with third-party providers.
Microsoft will challenge a US court order requiring it to give prosecutors electronic mail content associated with an overseas server in a data center in Dublin.
Microsoft said it was under investigation by antitrust authorities in China, pledging to cooperate in the investigation.
Officials from China's corporate regulator paid visits to Microsoft's offices in four cities in the country.
UK Travel Company W3 Limited was fined £150,000 for violating the Data Protection Act after hackers stole details of 1.1 Million payment cards.
Businesses that handle payment card data have to become compliant with the Payment Card Industry Data Security Standard 3.0 (PCI DSS 3.0) by December 31, 2014, yet many appear to be unprepared for the challenge.
LifeLock said that it has pulled its mobile wallet application from popular app stores and was deleting user information stored for the mobile app from its servers.
A panel of industry experts will be examining the institute's policies in light of controversy.
NIST has removed the Dual_EC_DRBG, or Dual Elliptic Curve Deterministic Random Bit Generator from its draft guidance on random number generators.


rss icon

Steve Ragan's picture
For most CISOs, the pain of an audit is part of the job, but it doesn’t have to be the nightmare that most of the IT community envisions.
Chris Hinkley's picture
Cloud infrastructures can be secure, and they must be for the need is growing quite fast. In this vein, organizations don’t have to be fearful of public clouds. They just need to better understand them.
Oliver Rochford's picture
To a security guru, GRC feels like a waste of time. It will provide artificial challenges that make a difficult task even harder, with very little gain or advantage in return other than a report containing lists of items with a marked checkbox.
Michael Goff's picture
In 2011 we were reminded that software piracy cannot be stopped. Despite the best efforts of software vendors, industry watchdog groups and government, software piracy continues to proliferate.
Mandeep Khera's picture
Merchants who are required to be PCI-DSS Compliant will have to get their validation under provisions of PCI-DSS 2.0 by December 31st, 2011. What are some of the key changes in PCI-DSS 2.0? Are you ready?
Chris Hinkley's picture
Mobile applications and the platforms they are built on make PA-DSS compliance difficult due to the rapidly evolving threat landscape. With increased attacks and their tragic affects on businesses and consumers, it's important to make make sure your mobile operations properly secured.
Chris Hinkley's picture
2011 has been a monumental year for hackers. Businesses as well as consumers felt the brunt of cybercrime by the millions, some of them a few times over. Here’s a look at the top hacks so far this year, and what we can learn from them.
Chris Poulin's picture
A properly deployed SIEM can add tremendous value to an organization’s security program. This week, Chris describes how you can get the most out of an SIEM solution through proper deployment strategies.
Chris Hinkley's picture
Real security goes beyond compliance, and integrates with validation and security processes. This causes confusion for many organizations as they pursue compliance standards. So let’s break it down.
Jon-Louis Heimerl's picture
If you are faced with regulatory compliance, you are faced with a legal issue. And, if you are not compliant, you are essentially breaking the law. There are many standards and regulations in place. But which ones are the most impactful?