Accelerating the Journey to PCI DSS 4.0 Compliance with ACI Worldwide
Articles

comforte and ACI Worldwide Partner to Help with Enabling PCI DSS 4.0 Compliance by March 2025

Thomas Gloerfeld

In a significant move towards enhancing payment data security and achieving compliance with the latest PCI DSS standards, ACI Worldwide has announced a strategic partnership with comforte AG, a global leader in data protection and compliance solutions. This collaboration aims to empower ACI’s customers to seamlessly transition to PCI DSS 4.0 standards by March 2025, ensuring robust security measures for payment transactions.

Nonstop Trends and Wins
Articles

NonStop Trends & Wins

Justin Simonds

IceFire is standard-fare ransomware.  It is a kind known as ‘big-game hunting’ (BGH) ransomware.  What is BGH ransomware? It is a kind of ransomware that is characterized by a double extortion model that targets large enterprises, using numerous persistence mechanisms.  It is very hard to detect since it covers it tracks by deleting log files.

cloud security shared responsibility
Articles

You are Responsible for Data Security in the Cloud

Thomas Gloerfeld

Cloud computing is the fuel powering modern digital transformation. Across the globe, organizations invested heavily during the pandemic to adapt to new market conditions, drive more efficient business processes and support mass home working. It’s estimated that 60% of corporate data globally is now stored in the cloud, and much of this will be in public cloud data centres.

data organization
Articles

Data is the Lifeblood of your Organization

Thomas Gloerfeld

Data is pretty crucial to any business these days. Many people claim that data is the most important asset you can possess, with more utility than capital assets and more meaningful (though often latent) insights than a host of human capital. Data reflects your entire business: your intellectual property, your industry, the broader market trends, the pain points and needs of prospective customers, and your existing customer base.

A picture containing indoor Description automatically generated
Articles

Psst! Compliance Isn’t the Goal!

Marty Edelman

Corporations spend billions of dollars annually on compliance audits and remediations, dollars that one can argue are misused. Whenever a new data privacy standard is released, entire teams are spun up to bring systems into compliance.

Articles

PCI DSS 4.0

Steve Tcherchian

Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy. A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new templates and supplements, including the “Migrating from SSL and early TLS Information Supplement” in April 2015 which highlighted the risks of SSL and TLS 1.0. The supplement described a migration plan as well as set a migration deadline of 1 July, 2016.

Articles

Security Spotlight

comforte

Holistic security means more than just implementing one tool, one method, one solution, or one process to protect your business’s data. It means exploring every avenue to implement a multi-pronged defensive strategy and never depending on just a single security tool or solution. Organizations that follow more holistic approaches to security are the ones best positioned to remain in compliance with internal and regulatory mandates and to prevent breaches or unauthorized access to sensitive data. They’re the ones who can best protect their intellectual property, their brand reputation, and their customers’ most sensitive data.