PCI Compliance for Legacy Devices: Using Expired PTS POI Devices in PCI-Validated P2PESolution
In a dynamic world of payment card data security, one of the most common questions among merchants and solution providers is: Can we continue using expired PTS POI devices if we have a PCI-validated P2PE solution? The answer? Yes, but conditionall...
Show Filters
Tracking Days Since the Last Java 0-day Vulnerability
Following the discovery of a brand-new Java zero-day vulnerability by FireEye on Februa...
Read More about Tracking Days Since the Last Java 0-day Vulnerability
Encrypt Your Secrets with a Deck of Cards
Bruce Schneier, an American cryptographer and security expert, created the Solitaire cryptographi...
Resuscitating John the Ripper for SHA-512
John the Ripper (http://www.openwall.com/john) is a well-known and mature password auditing tool....
Tevora’s Tokenization & Data Field Encryption
Ray Zadjmool in ISSA Journal Lake Forest, CA – November 2010 – Principal Consu...
Read More about Tevora’s Tokenization & Data Field Encryption
How to Parse Firewall Configs with Nipper.
Who said analyzing firewalls and network devices was something tedious and cumbersome? Well your ...
Virtualization, Security & Compliance and How They Can Exist Together
There is no doubt that virtualization is the hot trend right now. Many companies are beginning th...
Read More about Virtualization, Security & Compliance and How They Can Exist Together
Ever get to an authentication challenge in a client application and have that feeling of being ro...