Syndicated Blog

Ensuring PCI DSS 4.0 Compliance with Feroot: A Deep Dive into Requirement 6.4.3

Ensuring PCI DSS 4.0 Compliance with Feroot: A Deep Dive into Requirement 6.4.3

| | Blog
The Payment Card Industry Data Security Standard (PCI DSS) 4.0, issued a comprehensive set of requirements, to safeguard online payment systems against breaches and theft of cardholder data. Requirement 6.4.3 is one ...
Patient Privacy: Preventing Data Leakage in Healthcare

Patient Privacy: Preventing Data Leakage in Healthcare

| | Blog
The healthcare industry has rapidly embraced digital technologies to enhance patient care, streamline operations, and improve communication. However, this digital transformation brings with it a significant challenge: protecting patient data. One often ...
PCI DSS 4.0 Compliance: A Guide to Requirements 6 & 11

PCI DSS 4.0 Compliance: A Guide to Requirements 6 & 11

| | Blog
In the ever-evolving landscape of cybersecurity, staying ahead of threats and ensuring the safety of sensitive customer data is paramount. For organizations that handle payment card information, complying with industry standards like ...
Presence of pixels/trackers on websites - by sector

Pixels & trackers are present on mission-critical webpages and thereby increasing the likelihood of risks

| | Blog
In an analysis of over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) found pixels/trackers on 95% of their websites.  Each website in the ...
US States with Bans on ByteDance/TikTok

Independent of their Apps, bad actors banned by various executive orders have pixels/trackers on everyday websites 

| | Blog
“[China can] manipulate content, and if they want to, to use it for influence operations” – FBI Director Chris Wray  “To maintain the security of data owned by the state of Nebraska, ...
Percentage of ownership of pixels/trackers by platform owner

TikTok Trackers Can Still Be Present Regardless of TikTok App Installation

| | Blog
In an analysis of over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) across 6 sectors, it was discovered that TikTok pixels/trackers were present ...
Percentage of ownership of pixels/trackers by platform owner

Pixels/Trackers Can Collect & Transfer Data Without Consent

| | Blog
Analysis on 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) revealed that pixels/trackers are collecting and/or transferring data prior to the explicit consent (e.g., ...
Presence of pixels/trackers on websites by sector

Why Pixels/Trackers are Common and Abundant 

| | Blog
As part of a detailed study of pixels/trackers, an analysis of over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) found pixels/trackers on 95% ...
The Risks of Using ChatGPT to Write Client-Side Code

The Risks of Using ChatGPT to Write Client-Side Code

| | Blog
Since OpenAI released its AI chatbot software ChatGPT in November of 2022, people from all over the internet have been vocal about this program recently. Whether you love this software or despise ...
Reducing the Noise: Why Vulnerability Types Matter

Reducing the Noise: Why Vulnerability Types Matter

| | Blog
Most application security testing focuses on server-side vulnerabilities. While vulnerability management alerts are necessary within today’s threat landscape for increased security, your teams can quickly become overwhelmed by them. These alerts can ...

Secure Guardrails