PCI DSS 4.0 – Defined Approach vs. Customized Approach

PCI 4.0 – Let the fun begin

You’ve put it off, ignored it, or just been busy. Whatever the case, PCI version 4.0 is a reality as […] ...
The CMMC Proposed Rule is Out – Now What?

The CMMC Proposed Rule is Out – Now What?

What is CMMC? NIST Special Publication 800-171 (110 requirements) was first published in 2016 with an implementation requirement date of […] ...

Data Masking for PostgreSQL

Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous ...

Data Masking for PostgreSQL

Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous ...
PCI DSS 4.0 – What You Need to Know About INFI Worksheets

PCI DSS 4.0 – What You Need to Know About INFI Worksheets

Consistently maintaining compliance with any cyber security standard, especially a more prescriptive one like the PCI Data Security Standard (DSS), […] ...
Data Tokenization and Masking with Baffle in Amazon Redshift

Data Tokenization and Masking with Baffle in Amazon Redshift

Security and compliance for sensitive data in your cloud data pipeline and warehouse while running data analysis. The post Data Tokenization and Masking with Baffle in Amazon Redshift appeared first on Baffle ...
PCI and Wireless Technologies

PCI and Wireless Technologies

While using wireless technologies in a PCI environment can be tricky, it is possible to configure it appropriately and obtain […] ...

Understanding PCI DSS Compliance

| | Data Privacy, PCI
According to the PCI Security Standards Council Prioritized Approach document, the Prioritized Approach provides a roadmap of compliance activities based on the risk associated with storing, processing, and transmitting cardholder data. Approved ...
Five Things You Need to Start Right Now to Get Ready for PCI DSS v4.0

Five Things You Need to Start Right Now to Get Ready for PCI DSS v4.0

The game, Mrs. Hudson, is ON! Version 4.0 of the PCI DSS has been published, along with the Report on […] ...

Defense and Development: Key points from The Complete Guide to Application Security for PCI-DSS

| | PCI
The increasing popularity of online payment systems results from the world’s gradual transition to a cashless and contactless digital economy — an economy, projected in a recent Huawei white paper, to be ...