Resources
See below for recent media highlights and corporate news.
Segment Smarter, Not Harder: A PCI DSS 4.0 Roadmap
For many merchants, network segmentation testing may sound technical or overwhelming, but it’s one of the most powerful tools you can use to simplify compliance with PCI DSS 4.0. If you’re new to segmentation testing, this guide will help you understand what it is, why it’s essential, and how you can implement and test it…
The New PCI DSS Standards for Safer Payment Pages
The Payment Card Industry Data Security Standard (PCI DSS) is stepping up its requirements to address a significant, often overlooked vulnerability—third-party scripts. Beginning in March 2025, requirements 6.4.3 and 11.6.1 will require organizations to inventory, monitor, and secure third-party scripts embedded on payment pages. These changes reflect a proactive approach to safeguarding sensitive payment data from modern threats. Why…
Beyond the Audit: Continuous Monitoring for PCI DSS Compliance
With PCI DSS 4.0, payment card security is moving from periodic audits to a year-round, continuous monitoring model. Traditional annual assessments often leave vulnerabilities undiscovered until the next audit, creating dangerous gaps. Continuous monitoring closes these gaps by providing real-time insights into potential threats, integrating security and compliance into your organization’s daily operations. Why Continuous…
Approved Scanning Vendor (ASV)
What is an Approved Scanning Vendor (ASV)? An Approved Scanning Vendor (ASV) is an organization that utilizes security services and tools to conduct external vulnerability scanning in order to verify compliance with PCI DSS Requirement 11.2.2’s external scanning requirements. Before a scanning vendor’s ASV scan solution is added to the PCI Security Standards Council’s (PCI-SCC)…
Ethical Hacking
Ethical hacking is critical for determining how well-prepared organizations are to avoid, detect, and respond to emerging attack methods.
Managed SIEM Providers
Security Information and Event Management (SIEM) software solutions are used by business organizations of all sizes to detect and respond to potential IT security threats. Managed SIEM Services Providers implement and operate SIEM systems for businesses.