Open Mobile Menu

Blog

Filed In: PCI DSS

Creating Good PCI-DSS Network and Data Flow Diagrams

Leo Boike

Written By: Leo Boike

January 28, 2019

Views: 652

The most useful documents required of PCI-DSS are covered in PCI-DSS requirements 1.1.2 (network diagram) and 1.1.3 (data flow diagram).  Depending on the complexity of your network and processes, you could have one combined network and data flow diagram or you may require multiple diagrams.

Read more.

Filed In: PCI DSS

PCI 101: Transaction Volumes and Validation Requirements

Chip Ross

Written By: Chip Ross

January 02, 2019

Views: 340

Regarding PCI compliance, all entities that store, process or transmit cardholder data are subject to the requirements of the PCI Data Security Standard (PCI DSS). Merchant or Service Provider Level, and how cardholder data is handled normally determine how an entity is required to validate compliance.

Read more.

Filed In: SOC 1/2

It’s Time to Use the Latest SOC 2 Trust Services Criteria, Are You Ready?

Matthew Cooper

Written By: Matthew Cooper

December 14, 2018

Views: 4784

Starting this weekend, all SOC 2 reports with review periods ending after December 15th, 2018 must be conducted using the American Institute of Certified Public Accountants’ (AICPA) April 2017 release of the Trust Services Criteria. This blog post describes the major changes to the criteria and provides some advice for using it to prepare for your next SOC 2 audit.

Read more.

Filed In: Network Security, Security Testing

Web Application Enumeration at Scale

Stephen Haywood

Written By: Stephen Haywood

December 07, 2018

Views: 1189

When we conduct network penetration tests, we often find that the majority of accessible services are web applications. Often times, these web applications have administrative interfaces with weak/default passwords or have vulnerabilities that allow us to access sensitive data or even allow arbitrary execution of code.

Read more.