Pākiki Blog

The latest insights, vulnerabilities, research, and release information from the Pākiki team.

Follow us on social media:
Categories: Security  Proxy  Walkthroughs 
featured image PCI DSS 4.0 Compliance

PCI DSS 4.0 Compliance


Categories: Security Tags: Explanation
Over the last few weeks we have been having a number of conversations with clients about PCI DSS 4.0.1; specifically, where and how we could help them with being more compliant. Firstly, let’s take a look at what PCI DSS 4.0 is. The PCI Security Standards Council’s guideline document (Link in the … ...Read Article

featured image 3 Tips to Improve your Security Posture

3 Tips to Improve your Security Posture


Categories: Security Tags: Explanation
It was our honour to present at TechFest, run by Canterbury Tech, on the 24th of May 2024. This talk was designed as an introduction to improving your business’s cybersecurity posture. It’s aimed at small to medium businesses who are either unsure of where to start, or are rolling out new systems. … ...Read Article

featured image What Is an Intercepting Proxy?

What Is an Intercepting Proxy?


Categories: Proxy Security Tags: Explanation
That’s a great question. An intercepting proxy is commonly used by security professionals in order to understand how an application communicates with a server, and to attempt to find security vulnerabilities by manipulating that traffic. An intercepting proxy is a tool we frequently use in … ...Read Article