Compass IT Compliance Blog / Compliance (14)

OWASP Top 10: Why Compliance to OWASP Matters

OWASP Top 10: Why Compliance to OWASP Matters

During a recent web application penetration test, my Compass IT Compliance colleague Jesse Roberts was quickly able to identify and exploit a coding vulnerability on a client’s public facing web portal. As part of the engagement, Jesse was initially granted “standard user” access to t …

Read Story

A Closer Look at PCI DSS v4.0 Vulnerability Scanning Requirements

A Closer Look at PCI DSS v4.0 Vulnerability Scanning Requirements

The Payment Card Industry Data Security Standard (PCI DSS) requires vulnerability scanning of any organization’s network assets. Quarterly network scans are required of all companies to be conducted by a certified third-party Approved Scanning Vendors (ASV) or Qualified Security Asses …

Read Story

Self-Assessment Questionnaire (SAQ) A Changes in PCI DSS v4.0

Self-Assessment Questionnaire (SAQ) A Changes in PCI DSS v4.0

With the recent updates to the Payment Card Industry Data Security Standard (PCI DSS) requirements, many organizations that are currently PCI compliant in accordance with version 3.2.1 may become noncompliant with version 4.0.

Read Story

Using the HECVAT to Measure Vendor Risk

Students gather in a lecture hall

Not a day goes by without a conversation about third-party risk management. Our clients are being bombarded in all directions; asked by regulators, auditors, their clients, and customers alike to complete third-party risk assessments (SIG, CAIQ, HECVAT).

Read Story

PCI DSS v4.0 ROC Changes – Coming Now to an Organization Near You!

A person inserts their credit cared into a card reader

The Payment Card Industry Data Security Standard (PCI DSS) version 4.0 is here! It has been released, the documents are available publicly for anyone who would like to read them, and forms for both the 900-pound level 1 Report on Compliance (ROC) and the Self-Assessment Questionnaires …

Read Story

Ignorance Is Not Bliss When It Comes to Security Assessments

Ignorance Is Not Bliss When It Comes to Security Assessments

It is no surprise that bad actors constantly seek to take advantage of current events and changing circumstances to exploit vulnerabilities and gaps in the security of organizations across a myriad of industry verticals and sizes.

Read Story

Subscribe by email