Resource

Winning PCI Compliance E-Book

Download our free e-book where we share valuable tips and… Read more »

Resource

What to Expect with PCI 4.0

The Payment Card Industry Security Standards Council plans to release… Read more »

Blog

Point-to-point encryption (P2PE) version 3.0

It would be an understatement to say that the coming… Read more »

Blog

Common ASV Vulnerability Scan Misconfigurations

I am concerned that many users are not configuring their approved scanning vendor (ASV) scans per requirement 11.2 correctly. Read more.

Blog

How to Get Less Findings on Your Next Internal Penetration Test

LBMC Information Security’s Stewart Fey highlights a popular method that both pen testers and hackers alike use to gain a foothold on your internal network which typically leads to a full compromise/hack.

Blog

What’s New in PCI DSS v3.2.1?

The PCI Council is releasing a revision to PCI DSS v3.2. Here’s what you need to know.

Blog

What Every Business Should Know About Social Engineering Cyber-Attacks

LBMC Information Security’s Stewart Fey unpacks everything you need to know about social engineering cyber-attacks and how your organization can prevent them.

Blog

How Visa’s EMV Chip and CVV2 Changes Will Impact Merchants

With more and more merchants using EMV chip devices, Visa is making two significant changes that are important for merchants to know.

Blog

Attaining PCI Compliance With Vulnerability Scanning

Most companies with PCI compliance obligations are regularly performing their own internal vulnerability scans and reviewing the results. One important requirement with PCI vulnerability scanning control is performing quarterly scans.

Blog

Reducing PCI Scope, What Makes Good Network Segmentation?

To reduce PCI Scope, all systems in your environment must be in scope and PCI and all PCI requirements should be applied to them.