Top 10 Considerations for PCI 3.2

PCI QSA, Ismael Alfaro shares the top 10 priorities for PCI 3.2 in our short video. Highlights include key considerations for planning for and executing on achieving compliance over the next six months. While some changes in 3.2 are minor, there are others, including multi-factor authentication requirements that take significant planning and implementation timelines.

Read More

Windows Server 2003 Exploit: How to Protect Your Systems

If you’re running Windows Server 2003 with IIS 6.0 with WebDAV enabled, a recently-discovered exploitable vulnerability allows a remote attacker to run code against the application software and take control of the machine. The attacker could inject code and commands and get feedback, taking control of operating system level functions. This means that your critical data and intellectual property are at risk of compromise.

Read More

How to Beat the IT Talent Gap

A May 2016 survey of over 3,000 IT leaders by IT outsourcer Harvey Nash and auditing firm KPMG found that 65% report a skills shortage, while 44% expect to need to expand their IT teams despite the shortage. Also, 89% of CIOs noted that talent retention is a challenge as well.

Read More