Blog
Read the latest articles and posts.
PCI Compliance: Vulnerability Scans & Penetration Tests
This is the final of a six-part blog series about PCI compliance.
PCI Compliance: How to Develop a Remediation Plan
By Jane Laroussi, CISSP, QSA This is the fifth of a six-part blog series about PCI compliance. In recent weeks, we reviewed and explained PCI validation and reporting requirements, and we discussed the value of a readiness assessment before an official...
PCI Compliance: Readiness Assessment
By Jane Laroussi, CISSP, QSA This is the fourth of a six-part blog series about PCI compliance. Thus far in this series, we’ve set the stage for achieving PCI compliance. In Part 1, we listed and defined PCI-relevant terms; in Part 2, we discussed how to...
PCI Compliance: How to Complete Reporting Requirements
This is the third of a six-part blog series about PCI compliance. Last week, we discussed how to determine and minimize the scope of PCI compliance. This week, we’ll review and explain PCI validation and reporting requirements. And, you can always refer to part one of...
PCI Compliance: Scope
This is the second of a six-part blog series about PCI compliance. This week, we take a closer look at the scope of PCI Compliance, how to define it, and how to minimize it.
PCI Compliance: What is PCI Compliance?
This is the first of a six-part blog series about Payment Card Industry (PCI) compliance. Over the next few weeks, we’ll be discussing PCI, its scope, compliance reporting requirements, readiness assessments, remediation, penetration testing, and vulnerability scans. By the end of this series, we hope our readers will have a better understanding of PCI, its importance, and how to become compliant with PCI security standards.
Measuring Success in Cybersecurity
At Carson Inc., we understand how to develop enterprise risk management architectures, identify vulnerabilities, establish continuous monitoring programs, assess organizational exposure, and implement appropriate preventive measures. It is not simple, but if done right, access, security, and privacy can co-exist to the benefit of all.
The Cost of a Data Breach
At some point in time, your business will be breached. There are numerous ways for your system to be breached, but the key is being prepared. If you have all your data segregated and encrypted appropriately, then this will help lessen the damage done by the data breach. If you have also gone through different scenarios that could happen – whether it be malware or threat – and have a response plan in place, this can assist in decreasing the cost of a data breach.
Hospital Security: Medical Devices and Bluetooth
Various studies and research have been done revolving around the lack of security for some medical devices. One of the main problems found lay with embedded web services that allow devices to communicate with one another and feed digital data directly to patient medical records.