Blog

5 Steps on Your Journey Toward Data Privacy and Protection (DPP)

Data privacy and protection (DPP) laws aren’t entirely new to the security and compliance landscape, but the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) are prompting many organizations to take a more formal approach to DPP.

How Can You Tell if an App is Secure?

This blog explains how to do a quick risk assessment on an app in the app store or one that you’ve downloaded on your phone to determine if an app is secure.

Securing Keys and Certificates: A PCI Auditor's Perspective

Businesses must ensure their key servers, certificate authorities, open SSL libraries, and server updates are secure.

Fighting Phishing Email Scams: What You Should Know

Phishing Email Scams remain one of the top threats to companies.

Top 5 Blogs to Prepare for 2022

To help you focus your cybersecurity efforts, we've compiled our top 5 blogs to help you prepare for 2022.

Prepare and Train for Cybersecurity in 2021 With These 5 Blogs

How to prepare for cybersecurity in 2021. We outline the top five blogs to help you train employees, understand the threat landscape, avoid malware, and support compliance efforts as you head into 2021.

Different Types of Penetration Tests for Your Business Needs

What area of your business would benefit the most from a penetration test?

Increasing Satisfaction in PCI DSS Programs for Acquirers and ISOs

Increasing Satisfaction in PCI DSS Programs for Acquirers and ISOs: Learn why PCI DSS programs are beneficial to businesses and how to manage expectations around PCI programs.

Recap: SecurityMetrics’ 2020 Cybersecurity and Compliance Conference

From COVID-related challenges to firewall configuration to e-commerce web skimming, SecurityMetrics Cybersecurity Conference and Summit 2020 provided cybersecurity content and sessions for everyone in the data security and compliance industry.

2021 Data Breach Forensic Predictions and What Happened in 2020: Part 2

New cybersecurity threats were popping up rapidly going into 2020. We analyzed the trends and made predictions for the rest of the year

Securing Healthcare Mobile Devices

Patient data is in jeopardy when mobile devices aren't secure.

Jen Stone: Principal Security Analyst

Jen Stone is a Principal Security Analyst for SecurityMetrics. In her 4 years at SecurityMetrics, she has completed over 100 security assessments that include PCI, HIPAA, CIC CSC (SANS Top 20) and 23 NYCRR 500.

SecurityMetrics COVID-19 Coronavirus Update

With the upheaval and uncertainty many are experiencing around the world during the COVID-19 pandemic, we are more committed than ever to our mission.

CVE-2020-5497 - MITREid Connect Cross-site Scripting

MITREid Connect Cross-site Scripting Vulnerability: CVE-2020-5497 Here's the situation: I was performing a penetration test that integrated with MITREid Connect for authorization.

Matt Halbleib: Director of Assessments

Matt Halbleib holds QSA (Qualified Security Assessor), PA-QSA (Payment Application Qualified Security Assessor), and CISSP (Certified Information Systems Security Professional) security certifications and as a qualified assessor for the Payment Card Industry, has completed over 100 PCI DSS, PA-DSS and P2PE security assessments.

How a HIPAA Violation May Have Ruined a Football Star's Career

Hopefully this incident helps both healthcare to remember the fragility of patient data protection.

No Spreadsheets Needed: Manage HIPAA Compliance in SecurityMetrics’ Health Network Portal

Health organizations have been hit hard—the healthcare industry experienced 23.7% of total data breaches.

Top 5 PCI Blog Posts for SMBs

PCI for SMBs: as an SMB owner, your business size and card processing environment will ultimately determine which SAQ you need to follow.

PCI Council Releases PCI DSS 3.2.1: What You Need to Know

The Payment Card Industry Security Standards Council (PCI SSC) recently announced the release of the PCI DSS 3.2.1.

WPA2 Security Flaw “KRACK” Puts Wi-Fi Devices at Risk

On October 16, 2017, the WPA2 Security Flaw “KRACK” vulnerability was made public.

Recognizing a Phishing Email in the Age of Artificial Intelligence

Phishing remains one of the most effective methods for hackers to breach organizations.