Etikett: Blog
-

HSM – What is it and who needs one?
•
An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?
-

Can tokenization reduce PCI DSS audit scope?
•
Tokenization replaces cardholder data with an “alias”, a separate random-generated value called a token. Learn more on the blog
-

The Basics of Penetration Testing in PCI DSS
•
A penetration test could be described as but realistic cyber attack that aims to determine how deep an attacker would be able to penetrate
-

The Two Core Phases of Penetration Testing and PCI Compliance Pitfalls
•
When it comes to pen testing, it can always be roughly broken down in to two core phases: scanning and exploiting
-

New at Complior:
Amazon Web Services•
Employ the most-up-to-date and beneficial AWS tools with Complior. Meet your business needs and scale your business goals today
-

Sustainable PCI DSS Compliance
•
Reaching the milestone of PCI DSS compliance is a big thing – a great achievement – but staying compliant is the next challenge.
-

GDPR and US Privacy Shield 0.1.
•
The US Privacy Shield has been declared invalid. Read about the statement and what is meant by transferring personal data to a third country.
-

How PCI QSAs Contribute to Safer Cloud Services
•
Let’s take a closer look at the safest security standard in the market – and the people whose mission it is to protect it.
-

The Importance of Documentation in PCI DSS
•
Even the most expensive equipment and sophisticated knowledge in the company isn’t enough to get you through the PCI-DSS compliance process.
-

Why PCI DSS is important for the hospitality industry
•
The fact is that hotels tend to keep card data in several different places, all where card data is vulnerable to theft and intrusions