Information Security Leader, Author, Instructor and Speaker

Default utility Image

How to Choose Between Penetration Tests and Vulnerability Scans  TAGS: | Even seasoned cybersecurity professionals confuse penetration tests with vulnerability scans. Both play an important role in the security practitioner’s toolkit, but …Continue reading →

Default utility Image

Optional No More: Five PCI DSS Requirements Become Mandatory June 30th TAGS: | | If you reviewed the impact of the PCI DSS 3.0 changes on your organization two years ago, you might recall …Continue reading →

Default utility Image

PCI DSS Compliance Health Check TAGS: | | | How are you doing with PCI DSS compliance? Have you taken a close look at your controls recently to ensure …Continue reading →

Default utility Image

Getting Started with Automated Penetration Testing TAGS: | | | | The automated penetration test plays an important role in the security professional’s toolkit. As part of a comprehensive security program, …Continue reading →

Default utility Image

The final countdown to PCI DSS 3.0 mandatory implementation TAGS: | | | The clock is ticking for enterprises that have not yet upgraded their payment card processing systems to be compliant with …Continue reading →