WiFi – PCI compliance: Why is it Important?

    New devices and old alike:   The issue with WiFi is that it is a network piece that can bite you if you are not aware of it.   In PCI compliance the relevant section (besides the sections for configuring your device correctly at 4.1) The testing of Wireless networks is in 11.1: … Read more

What Do Compromised Websites Look Like?

Sucuri Blog has an interesting blogpost on how a website got compromised and allowed unencrypted Credit Card numbers(only in one specific area and for a few seconds) to be stolen from the Magento Ecommerce platform for a period of time.   Magento is an Ecommerce web system.   It Looks like Magento also had a … Read more

Cyber Disasters Still Coming? Yes, We Do Not Learn Fast Enough

As Washington Post wrote a story about the old Lopht group visit to the Capitol Hill. http://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecurity-part-3/ Do you remember the following historical events? True in 1871 Chicago had 330,000 residents. (from https://www.awesomestories.com/asset/view/CHICAGO-IN-1871-Great-Fire-of-1871 )   But this is what happened when many things happened simultaneously and overwhelmed the fire department response due to conditions(dry): The area of … Read more

Can the Cloud “Fix” Your Security Risks?

A nice article at Network World about how Milwaukee Tool used the “Cloud” to remake a significant part of the company (product development collaboration). (I like that picture) So we know the Cloud can help with multi-nation or multi-state collaboration efforts. The cloud can help with Application Development (not just tool product development) as well, … Read more