A Deeper Look into Data Encryption

    This last November (Nov. 6-9, 2018) Townsend Security had a chance to participate in the 20th annual PASS Summit in Seattle as an exhibitor. While there, they had an opportunity to ask attendees about their company's encryption and key management practices. Our own Tim Roncevich was able to review the results and give his expert opinion on some of the findings. Enjoy!

    Read More

    Ransomware Is Still an Ever-Present Threat: What You Need to Know

    Ransomware is like the flu. Everybody knows about it, nobody wants it, and many try to prevent it, but it spreads anyways.

    Read More

    PCI Compliance and the CIA Triad—Building Great Security

    Complying with the Payment Card Industry Data Security Standard (PCI DSS) ensures that you have taken the necessary safeguard to secure payment card data, and it should be a goal for your organization. However, PCI DSS compliance doesn't ensure that all data is secure—so it isn't a stopping point.

    Read More

    What Do WalMart and Airbus Have in Common? Cybersecurity

    A group of prominent investors aims to improve cybersecurity by building companies around new technologies for protecting data.

    Read More

    When is a PCI Audit Required?

    Unless you’ve been hiding inside a cave or stranded on a remote island somewhere in the middle of the ocean for the past decade, you are likely aware that the prevalence of cybersecurity attacks has increased exponentially.

    Read More

    Vulnerabilities in the AWS IoT Platform You Should Know About

    There is no denying that Amazon Web Services (AWS) is a popular choice among companies these days. Businesses like to store their data and run their operations through AWS because of the convenience and performance that its cloud-based storage and services provide.

    Read More

    Beware a Hacker's Precision Strike in Your Cloud Environment

    So, you think your data is safe because you stored it “in the cloud”? If your company is amongst a majority of businesses who decide to transfer to the cloud, you might be wondering if you should still be concerned about secure cloud computing. On one hand, you would have lower costs, added control, and a higher level of protection against security breaches; on the other hand, you are not impenetrable or immune to cyberattacks. While some things become safer, there is a whole new set of concerns and security challenges presented once you move to the cloud.

    Read More

    DEADLINE FOR THE NEW AICPA SOC 2 STANDARDS IS FAST APPROACHING

    What you should know regarding the key changes to SOC 2 reporting (TSP Section 100)

     

    Read More

    What You Need to Know About PCI Levels and Requirements

    Payment card data must be well-protected as damages from data breaches continue to mount.

    Read More

    Personally Identifiable Information: What You Need to Know About Keeping It Safe

     

    Media accounts of the theft of personally identifiable information by hackers seem to keep coming like a two-mile-long train—there just seems to be no end in sight.

    That’s because cyberthieves stand to make enormous amounts of money selling personal data in bulk on the black market.

    Read More

    Subscribe Here!