dcsimg

PCI DSS Compliance 101: What You Need to Know

If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or partner's payment card data, and an equally important step in protecting your business from the dire consequences of a data breach. … [Read more...]

Do Customers Really Care About Data Breaches?

How much customers care about data breaches is often dependent on the type of customer data obtained by attackers. … [Read more...]

A week in security (October 7 – 13)

Last week on Malwarebytes Labs, we peered into the possible future of cybersecurity insurance, described the process for securing today’s managed service provider, and provided an in-depth explainer on the business espionage tactic known as “war shipping.” Further, in considering the intersection of National Cybersecurity Awareness Month and National Domestic Violence Awareness Month, we gave … [Read more...]

Securing the managed service provider (MSP)

Managed service providers (MSPs) have been a boon to midsize enterprise. They allow for offloading technical debt to an agent with the skills and resources to manage it, thereby giving an organization room to focus on growing a business, rather than the particulars of infrastructure. For a long while, third-party service providers were not targeted directly for their security failures, as … [Read more...]

4 Myths of PCI Compliance

If your organization is finding it difficult to comply with PCI DSS, the Payment Card Industry Data Security Standard, it could be due to some of the misconceptions about the standard. … [Read more...]

October 2019  – Microsoft Patch Tuesday 

October is here and fall is in the air, even in Texas. Temperature dropped this past week from highs in the 90s to lows in the 50s (Fahrenheit). The state fair is in full swing here, and the stores are full of Halloween decorations. But to us IT security folks, ghosts and goblins aren’t nearly […] … [Read more...]

Explained: security orchestration

Working together in perfect harmony like the wind and percussion sections of a symphony orchestra requires both rigorous practice and a skilled conductor. Wouldn’t it be great if our cybersecurity solutions did the same to better protect organizations? The methods and tools used to accomplish this are often referred to as security orchestration. Even though security orchestration may sound … [Read more...]

The Spyware That Didn’t Come in from the Cold

Who doesn’t love a good spy thriller?  From James Bond to Jason Bourne, the espionage fiction genre has been a favorite of readers and movie-goers since the 1800s. It’s all fun and games until you find yourself in the middle of your own private spy story as the person (or company) that’s the victim of […] … [Read more...]

SSL 101: SSL/TLS Certificates And Why You Need Them

Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser. … [Read more...]

How to Lower the Risk of Employee Data Theft

As IT pros, we’ve been aware for quite some time that some users are a threat to security, whether by their use of shadow IT, their susceptibility to social engineering attacks from cybercriminals, or by using their employee role and access permissions to compromise data security. … [Read more...]