Web Application Security – How do you know which Solutions will work best for your Business?

March 9, 2008 • Published Categories Archive Tags , , , , , , , , ,

If you must store credit card data or you are interested in strengthening your current security practices, it is important to focus attention on your Web applications. PCI Requirement 6.6 requires that you ensure that all Web-facing applications are protected against known attacks by applying … Read more

Data Breaches Part I – Is it Possible to Prevent the Inevitable?

October 22, 2007 • Published Categories Archive Tags , , , , , , , ,

The media’s increased focus on data breaches.  As the settlement terms of the most talked about data breach in 2007-the TJX data breach-are being assessed in the millions, the Media’s attention has only increased its focus on data breaches. Industry-specific guidelines and compliance measures, such … Read more

Data Breaches Part II: Five Steps to Manage a Data Breach

October 22, 2007 • Published Categories Archive Tags , , , , , , , , , , ,

Though a smaller data breach than its predecessors at TJX and ChoicePoint, the musical instrument company Bananas.com (Bananas at Large) was the victim of a hacker, who, according to published reports stole an administrative password by accessing Bananas.com systems as a remote user. What’s interesting … Read more