PCI DSS 4.0 Compliance
Over the last few weeks we have been having a number of conversations with clients about PCI DSS 4.0.1; specifically, where and how we could help them with being more compliant.
Firstly, let’s take a look at what PCI DSS 4.0 is.
The PCI Security Standards Council’s guideline document (Link in the …
...Read Article
3 Tips to Improve your Security Posture
It was our honour to present at TechFest, run by Canterbury Tech, on the 24th of May 2024. This talk was designed as an introduction to improving your business’s cybersecurity posture. It’s aimed at small to medium businesses who are either unsure of where to start, or are rolling out new systems. …
...Read Article
What Is an Intercepting Proxy?
That’s a great question.
An intercepting proxy is commonly used by security professionals in order to understand how an application communicates with a server, and to attempt to find security vulnerabilities by manipulating that traffic. An intercepting proxy is a tool we frequently use in …
...Read Article