Blog

Why You Need to Know About PCI Requirements 6.4.3 & 11.6.1: Eskimming Findings from SecurityMetrics Investigations

SecurityMetrics has seen a dramatic increase in attacks specifically on ecommerce sites using iFrames to host a payment page from a 3rd party service provider.

PCI Compliance & Cybersecurity: Anedot's Journey with SecurityMetrics

In this case study, Anedot works with SecurityMetrics to better secure their cybersecurity infrastructure and to reach PCI DSS 4.0 compliance.

Internal Penetration Testing 101: Where to Start

While there are various types of penetration tests like external, web application, or mobile, this blog will focus on internal tests and why they matter.

Understanding the New PCI SAQ Type: SAQ SPoC

This article covers the Self-Assessment Questionnaire (SAQ) for Software-based PIN entry.

Updates to PCI DSS v4.0.1

The PCI Security Standards Council (PCI SSC) recently published a limited revision to the PCI DSS in the form of v4.0.1.

External Vulnerability Scanning FAQ: What is External Vulnerability Scanning?

External vulnerability scanning is a security practice that involves scanning and assessing the external-facing network infrastructure, systems, and applications of an organization for potential vulnerabilities.

2021 Security Year Review

2021 security year review and our predictions of things that we think will be forefront in cybersecurity this year.

Why Partner with SecurityMetrics for Data Security and Compliance?

We want to remove you from being the low-hanging fruit to hackers by improving your overall security posture. Our mission statement is to “close data security and compliance gaps to avoid a data breach.”

10 Misconceptions about Endpoint Security and Why You Need It

Endpoint security generally refers to cybersecurity tools or services that can help alert you on devices that may be compromised.

Artificial Intelligence and Cybersecurity: What Businesses Don't Know

AI or artificial intelligence can be used safely by businesses that are concerned about their cybersecurity.

Navigating AI Safely in Your Small Business: an AI Cybersecurity Perspective

A number of other interesting AI cybersecurity issues are hitting our radar as customers begin taking advantage of new AI tools in their small businesses.

How Much Does a Pentest Cost?

The most accurate way to know if you’re safe from a hacker is through live penetration testing, also called pen testing, or ethical hacking.

Common PCI DSS Questions for SMBs

This blog is intended for small to medium sized-merchant businesses and attempts to answer common PCI DSS questions.

New Ecommerce Security Tool: Shopping Cart Monitor

Shopping Cart Monitor has the potential to save online retailers a significant amount of money and frustration since content providers can be held liable for damages—damages that can cost retailers hundreds of millions of dollars every year.

Cost Effective Data Security Best Practices in the Workplace

Don't let cyber threats compromise your sensitive information. Follow these simple, cost-effective data security best practices for a secure workplace.

7 Ways to Recognize a Phishing Email: Examples of Phishing Email Scams

Here are seven email phishing examples to help you recognize a malicious email and maintain email security.

What are the 12 Requirements of PCI DSS Compliance?

The PCI DSS (Payment Card Industry Data Security Standard) is a security standard developed and maintained by the PCI Council. This article will serves as a “jumping off point” to understanding the 12 requirements of the PCI DSS.

GDPR FAQs

Find out the most commonly asked questions about GDPR.

Understanding the HIPAA Application of Firewalls

Like a security guard, firewalls control what goes in and what comes out.

HIPAA Compliance Best Practices

With over 20 years in the industry, we have found that these HIPAA compliance best practices are most helpful in securing your organization.

Blogengine.net Directory Traversal & Listing; Login Page Unvalidated Redirect

A directory traversal, CVE-2019-10717, was identified on BlogEngine.NET applications versions 3.3.7 and earlier through the /api/filemanager endpoint.

PCI Requirement 10: Logging and Log Monitoring

PCI requirement 10 is all about logging and log monitoring.

Authorization Bypass: CVE (2020-11679, 2020-11680, 2020-11681)

Attackers: Known or Unknown? That is the question.

Performing an SAQ C-VT version 4.0 Self-Assessment

This post will highlight changes made to the SAQ C-VT version 4.0 and provide guidance on how to comply with newly added requirements.