To assist stakeholders in their migration from PA-DSS to the Software Security Framework, PCI Security Standards Council (PCI SSC) is publishing a series of blog posts to guide payment software vendors and assessors through the key differences between PA-DSS and the SSF. In Part One of our multi-part blog series, PCI SSC’s Sr. Manager, Public Relations Alicia Malone sits down with PCI SSC’s Sr. Manager, Emerging Standards Jake Marcinko to discuss some of the conceptual differences between PA-DSS and the Software Security Framework that stakeholders should be aware of as they work to transition between programs.
A story of how easily hackers could hit a hole-in-one with the computer network of a premier golf club in the UK.
With the release of the Secure Software Lifecycle (“Secure SLC”) Standard v1.1 in February 2021 and the Secure Software Standard v1.1 in April 2021, updated versions of the associated reporting templates and attestation forms were also made available in the Document Library.
With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation. Learn to identify these scams. Most people are fans of the convenience provided by online shopping, but some criminals uses this to lure clients into Amazon scams. Learn to detect these. Now that organizations are set to evolve a
Most people are fans of the convenience Amazon brings to online shopping, and that’s precisely what cybercriminals are betting on.
The post Watch out for these scams, targeting Amazon’s customers appeared first on WeLiveSecurity
There are 30 vulnerabilities listed in total; organizations would do well to patch their systems if they haven’t done so yet
The post Leading cybersecurity agencies reveal list of most exploited vulnerabilities of the past 2 years appeared first on WeLiveSecurity
Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can - willingly or unwitingly - pose.
The post Tackling the insider threat to the new hybrid workplace appeared first on WeLiveSecurity