The PCI Council officially released PCI DSS version 3.0 in January, 2014. Many merchants are still working through their PCI Compliance audit that started in 2013 for the requirements of version 2.0. Clearly, their Report on Compliance (ROC) will be based on providing evidentiary support requir ...
Read MoreThis is a requirement for sub-control 2.4. Inventory of systems refer to all hardware and software, virtual or physical within the cardholder data environment (CDE). This essentially means a list of all the hardware and software used, their purpose in being in the CDE, what they are and why they ...
Read MoreAn obvious discovery of any malicious finding is an incident and immediate actions should take place to arrest and minimize effects. However, there are incidents that fall into grey areas. Any actual incident has implications such as legal, compliance, and other regulatory components. A set of ...
Read MoreHackers are "Hacking all the things". We are starting to hear about environments like thermostats, heating, ventilation, air-conditioning using web interfaces and http custom protocols. Those are big security issues. Next, over the last several months there have been numerous cases of hackers ta ...
Read More