Achieving PCI compliance with a third-party service provider If you’re working with a third-party service provider, remember it’s still the responsibility of your organisation to ensure that your customers’ data is handled in compliance with PCI DSS standards. Best Practices for Security Testing Whether this is routine testing for common vulnerabilities or security-focused penetration testing, these best practices will help your team fix problems. Should Your Organisation Be Worried About Ransomware There’s a new threat facing your organisation. It uses never before seen tactics to get straight to the heart of your secure systems; compromising your valuable data and attempting to exploit your organisation for thousands of pounds. How to Reduce Social Media Security Risk Your organisation needs to think carefully about the risk social media poses to its security, and how to Reduce Social Media Security Risk How to Sustain PCI Compliance Once they’ve achieved PCI DSS compliance, many companies see that as a box ticked that they don’t need to think about for another 12 months. But PCI standards should be adhered to 24/7/365. Why You Need to Measure Your Application Security Program If you aren’t measuring your efforts by tracking and analysing your results, you will end up with an incomplete and ineffective program, without the support, funds or focus required to protect your organisation against security breaches. Do staff need to be trained in social media security Should their staff be trained in social media security? Or does it pose minimal risk? Reduce the Risks of Phishing Phishing is a big problem for organisations, for two simple reasons: it’s easy to do, and it works. It’s relatively easy for hackers to send hundreds of thousands of emails, to employees at hundreds of organisations. Signs you need to define software development process Look out for these 5 signs that your company needs to define its software development process. Are you really writing secure software Most experienced software developers have an understanding of common security issues, but no one developer can ever know everything. We share some of common security blunders developers make. 1 2 3 4 5 6 7 8 9 10 11 12 13 ← Prev Next →