
PA-DSS and PCI DSS: Beware the critical difference!

P2PE – Don’t Lose Your Investment

NIST Cybersecurity Framework 2.0: A Deep Dive into the New Governance Function

New! More! A First Look at the PCI DSS 3.0 SAQs

Merchants: Know Your Service Providers!

Merchant? Service Provider? Or Both?

ISO27001 vs. ISO27002

ISO 27002:2022

Internal vs. External Vulnerability Scans: Why You Need Both

Is PCI Compliance a Law? Should it be?

Introducing PCI DSS 4.0

Integrating CVSS 4.0 into VikingCloud Penetration Testing

Improving Security Awareness - Best Practices

Important Links

How You Can Use Tokenization to Reduce PCI Scope

How Women in Payments, Fintech, and Cybersecurity are Breaking the Glass Ceiling

How To Select A PCI Compliant Service Provider: Advice For Small Business Owners

How To Secure Your Software Supply chain

Hardening Against Potential Attacks from Elevated Geopolitical Cybersecurity Risks

How Does Taking Credit Cards by Phone Work with PCI?”

How to Report a PCI Violation

How Can Your PCI Compliance Efforts Ultimately Save Your Business Money?

Ensuring Penetration Testing Leads to Security

Five Steps Before Using a Mobile Device to Accept Credit Cards

Endpoint Protection; a Vital Tool in the Battle Against Ransomware