Learn about the history of PCI DSS and what's expected with the release of PCI DSS 4.0, including:
Details on how PCI DSS has changed with each new iteration since 2004;
Information on the additional requirements of PCI 4.0 for designated entities;
Knowledge on the expected rise in adoption of the PCI...
Gain an understanding of what PCI compliance requires of organizations as well as the true cost of obtaining compliance, including:
What benefits your company will enjoy by investing in PCI compliance
The cost of non-compliance, including data breach costs;
A breakdown of upfront and ongoing costs for each...
In this guide, we cover the importance of sensitive data and compliance for your organization when it comes to issuing payment cards. You will learn:
PCI compliance responsibilities for your card issuing business
Ways that you can retain full ownership over your data while gaining the most utility from it;...
The U.S. SEC announced civil action against defunct cryptocurrency lending platform BitConnect for allegedly defrauding investors out of $2 billion. In response, experts say cryptocurrency markets will face continued scrutiny over investor protections, fraud and security.
Ireland's privacy law enforcer, the Data Protection Commission, has hit WhatsApp with a 225 million euro ($266 million) fine, finding that it violated the EU's General Data Protection Regulation in part by not telling users how it was sharing their data with parent company Facebook.
The House began debate Wednesday on legislation that would require companies that own or operate parts of the nation's critical infrastructure to report a cyberattack or breach within 72 hours of confirmation.
Darrell Bateman, the CISO of City Bank Texas, explains why governance and compliance issues are critical for security leaders in the banking industry and how success can help cement a CISO's relations with the board of directors.
The impact of Hurricane Ida, including huge power outages, points to the importance of healthcare organizations and others having comprehensive business continuity and disaster recovery plans in place for natural disasters as well as cyber incidents.
Because a relatively small number of individuals provide the vast majority of services and infrastructure that power cybercrime, they remain top targets for arrest - or at least disruption - by law enforcement authorities, says cybercrime expert Alan Woodward. But of course, geopolitics sometimes gets in the way.
The Department of Defense did not effectively control access to the health information of high-profile personnel, says a new watchdog agency report, which hints that the findings also may indicate ineffective access control over other DoD employees' health records.
Sen. Pat Toomey of the Senate Banking Committee is requesting input from the cryptocurrency and blockchain community to inform future legislation on its security and privacy. Several experts praise efforts to regulate the space, but cite its complexities.
What makes software security effective? Ultimately, effective software security needs to integrate and automate both accurate testing and remediation into developer workflows, train developers to avoid security flaws, and prove your security posture -- otherwise, you are choosing between speed and risk. This is even...
Phishing, ransomware and unauthorized access remain the leading causes of personal data breaches as well as violations of data protection rules, Britain's privacy watchdog reports. The U.K. government has also been caught out by breaches and leaks involving military secrets and CCTV footage from a government building.
The Biden administration unveiled a package of supply chain and critical infrastructure security initiatives following a meeting at the White House with tech executives and others. Companies such as Google and Microsoft also promised billions in spending on cybersecurity over the next several years.