What Are the 5 Trust Services Criteria (TSC) for SOC 2?
by Kyle Daun on July 10, 2024 at 1:00 PM
Adhering to industry standards is crucial for organizations that manage sensitive data and rely on robust information systems. The SOC 2 Trust Services Criteria (TSC) provides a comprehensive framework to ensure systems are secure, available, and reliable. This blog will explore the f …
10 Best Undergraduate Cybersecurity Programs in 2024
by Kyle Daun on June 11, 2024 at 10:50 AM
The information presented in this article was meticulously gathered by analyzing top search results and consulting numerous reputable sources. Additional school data was derived from US Department of Education publications, Careers360, and other relevant pages. It is important to note …
Self-Assessment Questionnaire (SAQ) P2PE Changes in PCI DSS v4.0
by Kyle Daun on April 3, 2023 at 1:45 PM
Right around this time last year, the Payment Card Industry Security Standards Council (PCI SSC) published version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS v4.0 replaces version 3.2.1 to address emerging threats and technologies and enable innovative methods to combat …
Self-Assessment Questionnaire (SAQ) A Changes in PCI DSS v4.0
by Kyle Daun on September 16, 2022 at 2:45 PM
With the recent updates to the Payment Card Industry Data Security Standard (PCI DSS) requirements, many organizations that are currently PCI compliant in accordance with version 3.2.1 may become noncompliant with version 4.0.
PCI DSS v4.0 Released – What Changes Were Made?
by Kyle Daun on April 4, 2022 at 2:15 PM
On January 1st, 2019, the Payment Card Industry Data Security Standard (PCI DSS) v3.2.1 came into effect replacing v3.2 which had been in place since October 31st, 2016. Many changes have occurred since January of 2019, one of which being the worldwide shut down in the first half of 2 …
The Greatest Vulnerability Still Remains – End Users
by Kyle Daun on December 15, 2021 at 1:00 PM
Recently, I had the opportunity to attend the Boston Cyber Security Summit. One of the most common topics discussed at the event was organizations’ information being compromised by the end user.