What You Need to Know About PCI DSS 4.0 New Requirements
In keeping with its ongoing goal of safeguarding cardholder information, the PCI Security Standards Council (PCI SSC) is rolling out a new version of its Payment Card Industry Data Security Standard (PCI DSS). This updated iteration came from extensive feedback from...
New US Law to Require Cyber Incident Report
Cybersecurity concerns have gained even greater significance in the recent Russia-backed SolarWinds sabotage and the Ukrainian war. In response, the US House and Senate will soon pass the Cyber Incident Reporting for Critical Infrastructure Act of 2022. Shortly after...
Multiple Security Flaws Discovered in Popular Software Package Managers
Recent security vulnerabilities in popular software package managers are raising concerns among digital safety experts. When these flaws compromise machines, it may be possible for hackers to get their hands on sensitive information, including source code and access...
Mobile Threats Skyrocket
Although mobile devices are portable, powerful, and convenient, their use in employees' jobs is coming at a price. The very features that make them compelling also render them especially vulnerable to hacking. Data shows that nearly one-third of zero-day attacks now...
Hacked US Companies to Face New Reporting Requirements
When cybercriminals target sensitive data or charge companies or agencies a ransom to retrieve their encrypted information, the consequences can be dire. In response, Congress has passed a bill that will require that entities who deal with critical US security-related...
2022 Revisions to ISO 27002
Blog Impacts on ISO 27001 ISO 27002 is the companion standard to ISO 27001 and provides best practices for implementing information security controls. The latest version, ISO 27002:2022, was published on February 15, 2022, and replaces ISO 27002:2013. ISO...
SOC 2 Report Example
Blog SOC 2 reports are essential for any organization that handles customer data, ensuring that your systems are secure, available, and private. Essentially, a SOC 2 report gives your customers peace of mind, knowing that their information is in safe hands. ...
High Severity WordPress Plugin Bug Hits Three Million
According to security experts, a popular WordPress plugin contains a bug that could compromise user data and even hijack vulnerable websites. The solution is to update as soon as possible. The plugin, UpDraftPlus, is commonly used to back up users' data. As a result,...
Security Concerns are Biggest Barrier to Cloud Adoption
The adoption of cloud-based services continues to accelerate. In fact, 97 percent of those surveyed in recent Confluera research indicated that their organizations expect to expand their cloud deployments. To that end, many are enhancing the scope and extent of their...
More Organizations Suffered Phishing Attacks in 2021 Than in 2020
Thanks to intense media focus on the issue, the end-users of digital products should be much more aware of the dangers of data breaches. Nevertheless, every indication is that cyber attacks such as phishing schemes continue to increase in severity. In fact, a...