Information Security Leader, Author, Instructor and Speaker

Default utility Image

PCI DSS 3.2: Is this really the end? TAGS: Has the era of major revisions to the Payment Card Industry Data Security Standard (PCI DSS) come to an end?  …Continue reading →

Default utility Image

2015: The InfoSec Year in Review TAGS: | | | | | | We’re wrapping up quite a year in the world of cybersecurity!  As we entered 2015, the world was just winding …Continue reading →

Default utility Image

Compliance in the Cloud TAGS: | | As enterprises around the world adopt cloud computing strategies, personally identifiable information, health records, credit card numbers and other regulated …Continue reading →

Default utility Image

Get Ready for PCI DSS 3.1! TAGS: | | | Get ready, everyone – the next version of PCI DSS is on the books! If it seems like you’re hearing …Continue reading →

Default utility Image

Optional No More: Five PCI DSS Requirements Become Mandatory June 30th TAGS: | | If you reviewed the impact of the PCI DSS 3.0 changes on your organization two years ago, you might recall …Continue reading →

Default utility Image

Exploring PCI DSS Requirement 2 Compliance Issues TAGS: | | Readers of the 2014 Verizon PCI DSS compliance report may be surprised to learn that 48.9% of companies failed to …Continue reading →

Default utility Image

Could Apple Pay fundamentally change PCI DSS compliance? TAGS: | | Apple Pay, the recently released mobile payment system on Apple’s iPhone 6, is making waves in the security community and …Continue reading →

Default utility Image

Can legal departments complement IT security? TAGS: | | | Legal teams have long played an important role in information security and compliance programs. The expertise that attorneys bring to …Continue reading →

Default utility Image

PCI DSS Compliance Health Check TAGS: | | | How are you doing with PCI DSS compliance? Have you taken a close look at your controls recently to ensure …Continue reading →

Default utility Image

Getting Started with Automated Penetration Testing TAGS: | | | | The automated penetration test plays an important role in the security professional’s toolkit. As part of a comprehensive security program, …Continue reading →