Cybersecurity risk management is a technical necessity and a strategic imperative. Cyber threats are continuously...
PCI Compliance: Vulnerability Scans & Penetration Tests
This is the final of a six-part blog series about PCI compliance.
PCI Compliance: How to Develop a Remediation Plan
By Jane Laroussi, CISSP, QSA This is the fifth of a six-part blog series about PCI compliance. In recent weeks, we...
PCI Compliance: Readiness Assessment
By Jane Laroussi, CISSP, QSA This is the fourth of a six-part blog series about PCI compliance. Thus far in this...
PCI Compliance: Scope
This is the second of a six-part blog series about PCI compliance. This week, we take a closer look at the scope of PCI Compliance, how to define it, and how to minimize it.
PCI Compliance: What is PCI Compliance?
This is the first of a six-part blog series about Payment Card Industry (PCI) compliance. Over the next few weeks, we’ll be discussing PCI, its scope, compliance reporting requirements, readiness assessments, remediation, penetration testing, and vulnerability scans. By the end of this series, we hope our readers will have a better understanding of PCI, its importance, and how to become compliant with PCI security standards.