E: [email protected]  P: (949) 270-0504
E: [email protected]  P: (949) 270-0504

By

Jeff Tutton
Photo source: anidirect.com PCI Compliance and Data Security A dichotomy exists between information and data – and the way that information and data are discussed, stored, protected, and used. Any number of people reading this might identify themselves as working with “Information Systems” in the field of “Information Technology,” and some of them work with...
Read More
An article titled  A First Look at the Target Intrusion, Malware posted January 15 by @briankrebs contained an initial analysis of BlackPOS a POS malware targeting retail systems. Retail POS along with other related software, including security systems and software appears to be a common weak link. The hackers have concluded that if you focus on...
Read More
Author: Bill Corbitt http://www.linkedin.com/in/bulwarkz Abstract This paper analyzes several recent breaches of major players in the security industry, in particular security products vendors and Certificate Authorities (CAs). Distinct patterns and relationships have emerged that have allowed the prediction of the next set of potential targets. Without the implementation of stringent compliance standards for CAs one...
Read More