by klinesa | Oct 7, 2015 | Compliance
By Matthew Brincefield, Lead Penetration Tester This is the final of a six-part blog series about PCI compliance. Throughout this series, we have referred to the PCI Data Security Standard to lead our discussion on PCI compliance. The PCI DSS has helped us define the...
by klinesa | Sep 29, 2015 | Compliance, Cybersecurity
By Jane Laroussi, CISSP, QSA This is the fifth of a six-part blog series about PCI compliance. In recent weeks, we reviewed and explained PCI validation and reporting requirements, and we discussed the value of a readiness assessment before an official...
by klinesa | Sep 22, 2015 | Compliance, PCI Compliance
By Jane Laroussi, CISSP, QSA This is the fourth of a six-part blog series about PCI compliance. Thus far in this series, we’ve set the stage for achieving PCI compliance. In Part 1, we listed and defined PCI-relevant terms; in Part 2, we discussed how to...
by klinesa | Sep 2, 2015 | Compliance
This is the second of a six-part blog series about PCI compliance. Last week, we discussed terminology of PCI Compliance, what it is, and to whom it applies. Refer to part one for a glossary of PCI-related terms at any time during the series. This week, we’ll...
by klinesa | Aug 26, 2015 | Compliance, Cybersecurity 101, PCI Compliance
This is the first of a six-part blog series about Payment Card Industry (PCI) compliance. Over the next few weeks, we’ll be discussing PCI, its scope, compliance reporting requirements, readiness assessments, remediation, penetration testing, and vulnerability scans....