Malware, Virus, Anti-malware, Antivirus: What’s the Difference?

|
pt-blog-malware-virus-anti-malware-antivirus-differences-banner-01.png Language English AntivirusRomeo once asked the now infamous question, “what’s in a name?” If he’d been asking about malicious software, Juliet surely would have answered, “well, it’s complicated.” The world of cybersecurity has been such a goldmine of new terms and buzzwords that it is easy to get them ... Read More

Staying Accountable: A Sarbanes-Oxley (SOX) Overview and Compliance Checklist

|
sox-compliance-and-security-700x350.png Language Undefined UncategorizedBack in the late 90s and early 2000s, a number of instances of financial fraud were uncovered in large public corporations, leading to a growing feeling of distrust in the market. Back in 2001, for instance, a scandal surrounded the American energy company Enron when they were ... Read More

Secure Transactions: A PCI-DSS & PA-DSS Overview and Compliance Checklist

|
secure-transactions-pci-dss-pa-dss-overview-and-compliance-checklist-700x350.png Language Undefined UncategorizedWith the advent of the Internet in the late 1990s, credit card fraud surged. Though credit card companies came out with their own individual security programs, merchants accepting multiple types of credit cards had difficulty meeting multiple standards. Eventually, credit card companies banded together to create the ... Read More

Why is Multi Tenancy Important in a SIEM Solution?

|
cs-multi-tenancy.png Language English SIEMAll SIEMs are well known for their ability to monitor IT infrastructures for potential threats, escalating them to the appropriate party. Though these solutions share this core function in common, SIEMs differ widely in terms of features. It’s important to evaluate your own environment to determine what ... Read More

Secure Guardrails