article thumbnail

How to gain a five star security reputation in hospitality

CIO

Achieving and sustaining compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a daunting challenge for hotels because they handle many complex payment business cases. compliance steps. See the PCI Security Standards Council (SSC) Requirements and Testing Procedures , Version 4.0 is set to expire.

Hotels 264
article thumbnail

Retail Cybersecurity: The Importance of Compliance and Risk Management

Firemon

Retail Cybersecurity A Shift in Retail IT Security What’s at Stake? The Role of FireMon in Retail Cybersecurity Why Choose FireMon? Retailers , in particular, are attractive targets due to large repositories of customer data and often inadequate security measures. in late March of this year with 63 new requirements.

Retail 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Where do IT leaders stand on securing the mainframe?

CIO

Whether it’s buying groceries, making a bank transfer, or booking a flight, the mainframe is powering how consumers interact with organizations and is behind millions of transactions that take place every day. This means the security of the mainframe is absolutely essential. Read on to learn their perspective on mainframe security.

article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. In a field driven by constant change, what sets a cybersecurity leader apart? With new cybersecurity regulations like the U.S.

Security 131
article thumbnail

#760 How to talk Cybersecurity with your C-Suite in 2024 with Chris McKie & Matthé Smit from Datto

Modern CTO

We discuss how to have the cybersecurity conversation with c-suite executives, the ransomware threats that aren’t going anywhere anytime soon, and why the smallest stupid oversights often lead to the biggest breaches. Today we’re talking to Chris McKie & Matthé Smit from Datto. All of this right here, right now, on the Modern CTO Podcast!

How To 109
article thumbnail

Article: Q&A on the Book Cybersecurity Threats, Malware Trends and Strategies

InfoQ Culture Methods

The book Cybersecurity Threats, Malware Trends and Strategies by Tim Rains provides a overview of the threat landscape over a twenty year period. It provides insights and solutions that can be used to develop an effective cybersecurity strategy and improve vulnerability management. By Ben Linders, Tim Rains.

Malware 116
article thumbnail

Cybersecurity Snapshot: Want to Deploy AI Securely? New Industry Group Will Compile AI Safety Best Practices

Tenable

A group that includes the Cloud Security Alliance, CISA and Google is working to compile a comprehensive collection of best practices for secure AI use. Meanwhile, check out a draft of secure configuration recommendations for the Google Workspace suite. Dive into six things that are top of mind for the week ending December 15.

Groups 71