One would think that such big names can't just fall into the same trap as others. Huge operations like the Schnucks and Harbor Freights of the retail industry are always vigilant of the cybercrime world and constantly taking measures to stay ahead of the game. They spend several thousands on kee ...
Read MoreLogs play a pivotal role in PCI DSS and are crucial to discovering possible threats, vulnerabilities, breaches, and the mitigation and remediation of breaches. The fuss is also about satisfying the requirements of every sub-section of this control plus the review and parsing of logs, reports followi ...
Read MoreOften, security breaches are a result of third-party involvement. Several organizations trust third-party vendors more than their internal staff. The belief comes from the fact that third-party vendors, especially the big names would have their own security policies and processes before they dea ...
Read MoreThis is possibly one of the most important steps toward preparing your organization for true security and not just paper security. There are risk assessment templates that a data security team can use but what is relevant to an organization are the true risks related to their particular environmen ...
Read MoreHere's a quick summary of a hack involving 5 hackers from Ukraine and Russia. The US Secret Service had been on the case for a while and in a federal indictment recently in New Jersery, the hackers were charged for consipiring in a worldwide data breach scheme involving hundreds of millions of doll ...
Read More