Featured Blog

/

On December 30, 2015

Perform internal vulnerability scanning at multiple locations anytime without impacting your store activities

Omega Appliance Are data security measures like internal vulnerability scanning, network monitoring, and log collection from the cardholder data environment (CDE) becoming a challenge in your retail enviro ...

Read More
/

On December 30, 2015

Data breach: What happens to the stolen data? When will they be used?

breach Stolen data via a data breach can be used in a number of ways.  However, it is hard to predict when they will be used.  Here's a quick look at both. What is the data used for?

/

On December 4, 2015

Data security requirements for new small merchants

According to recent forensic investigations, small merchants remain targets of hackers who are attempting to compromise payment data. As part of an effort to secure the payment system and mitigate the risk of small merchant compromises, Visa is establishing requirements for U.S. and Canada acquirers ...

Read More
/

On December 3, 2015

Step-up risk reduction. Refresh with most read data security articles of 2015 and plan your 2016 strategies.

LetterHeader - Copy The year 2016 is fast a ...

Read More
/

On November 10, 2015

Cybersecurity Information Sharing Act bill passed in the Senate despite opposition from private companies

cybersecurityThe purpose of the Cybersecurity Information Shar ...

Read More

Stay up to date with the latest from Omega