Information Security Standards

Starting with Chrome 61, Google has declared that it will no longer trust the Chinese certificate authority named WoSign therefore any website that is currently using them for certificates need to prepare for a transition. The phase out began with

Extracted from a podcast by Tim White, Director of Product Management, Policy Compliance at Qualys, who talks about regulatory compliance trends that across a variety of different regions in the world, as well as strategies for dealing with them. Compliance,

Businesses in the UK could face up to £122 billion in fines for cybersecurity breaches in 2018, according to new findings from the Payment Card Industry Security Standards Council (PCI). The increase in fines would come as part of new

Deadlines for compliance for two of the most important mandates in PCI DSS version 3.2 have been delayed to 2018. The PCI Security Standards Council (PCI SSC) last month published a new version of its data security standard (DSS), used

It is no secret that the Health Insurance Portability and Accountability Act (HIPAA) is a trap for the unwary. A recent study by the non-profit ProPublica has uncovered that the online review site Yelp (as well as other rating sites)

Hewlett Packard Enterprise is looking to realign channel partners in Europe around the cloud and shift their mindset from selling dedicated hardware to selling usage-based cloud computing and software-as-a-service. This local grassroots approach to the European cloud market is a

This month, China’s National Information Security Standardization Technical Committee (“NISSTC”) organized a meeting to launch a working group tasked with drafting a Personal Information Security Standard (“PIS Standard”). NISSTC is a government committee jointly supervised by the Standardization Administration of China and

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption doesn’t prevent hacking but it reduces the likelihood that the hacker will be able