PCI Compliance for credit cards

PCI Compliance: How to Redact Credit Card Info from Inbound Emails

Language EnglishTags: <a href='/blog?tag=Adaptive Redaction'>Adaptive Redaction</a> <a href='/blog?tag=Compliance'>Compliance</a> <a href='/blog?tag=Email Security'>Email Security</a> <a href='/blog?tag=Information Governance'>Information Governance</a> When You Need Protection from Critical Information. Just when all the heavy lifting is done to enhance the protection of payment card data to comply with PCI DSS (Payment Card Industry Data Security Standard) ... Read More
Protecting Oracle E-Business Suite: Reducing the Attack Surface

Protecting Oracle E-Business Suite: Reducing the Attack Surface

/
This is the fourth consecutive blog post in our series on how to make Oracle E-Business Suite more secure. In this post, we will focus on reducing the attack surface - something that is a critical component for any successful information security strategy. The more you can reduce the components ... Read More
Protecting Oracle E-Business Suite: Password Policy

Protecting Oracle E-Business Suite: Password Policy

/
For a third week in a row, we’re providing you with best practices for securing your Oracle E-Business Suite implementation. Today, we are going to talk about a common topic: password security. When it comes to password policy, the first thing that probably comes to mind is having a secure ... Read More
Default Blog Author Icon

Webinar: Stomp Out Malware from Encrypted Traffic with Cisco Stealthwatch and Cognitive Analytics

/
Blog Post Webinar: Stomp Out Malware from Encrypted Traffic with Cisco Stealthwatch and Cognitive Analytics Jun 29, 2017 Did you know that more than 40% of malware is hiding in encrypted traffic used by browsers, email, and cloud applications? And, did you know, that... Read more > stealthwatch, webinar, encrypted ... Read More
Protecting Oracle E-Business Suite: Hashed Passwords

Protecting Oracle E-Business Suite: Hashed Passwords

/
Last week, we begin a blogpost series with the objective of reviewing Oracle E-Business Suite Security. The first publication detailed how to activate the Server Security Feature, and in today’s post we will focus on password hashing. We will analyze the different types of hashing and how it is implemented ... Read More
Protecting Oracle E-Business Suite: Activate Server Security

Protecting Oracle E-Business Suite: Activate Server Security

/
As most of our regular readers may know, the Onapsis Research Labs have been working on developing Oracle Security for several months. We’ve done this by updating our readers with analysis on quarterly patch updates, and to date have released over one hundred advisories for this platform. In our continous ... Read More
Default Blog Author Icon

Upcoming Webinar: Network Device Classification – Focus on Network Segmentation

/
Blog Post Upcoming Webinar: Network Device Classification - Focus on Network Segmentation May 25, 2017 Which of these three network segmentation phases is your biggest IT challenge? First: Defining your segmentation goals. Second: Understanding your... Read more > stealthwatch, expert series webinar, webinar, network segmentation ... Read More
Default Blog Author Icon

Upcoming Webinar: Use Stealthwatch Response Management to Send Alarms to Other Systems

/
Blog Post Upcoming Webinar: Use Stealthwatch Response Management to Send Alarms to Other Systems Apr 20, 2017 Do you need to log events outside of your Cisco Stealthwatch System? Do you want to receive Email notifications about certain alarms? Does your... Read more > ... Read More