In this 45 minute webinar, ControlCase will discuss the following: Description of "Token Service Provider" (TSP). Eligibility and steps to become a TSP. Scope and implementation. Review of TSP Standard.
Security Fundamentals: File Integrity Monitoring
ControlCase Monthly Newsletter July 2018 Log Monitoring and File Integrity monitoring Security Log Monitoring services help clients to weed through system and audit logs quickly and cost effectively, leaving only relevant records that the organization must analyze and retain. ControlCase’s Log
GDPR Readiness Assessment
ControlCase Newsletter GDPR Readiness Assessment GDPR Readiness Assessment GDPR applies to all entities processing personal data of any subjects residing in the EU, regardless of the entity's location. Failure to comply will see organizations charged with fines of up to €20 Million or 4% of
Compliance as a Service for Business as Usual
ControlCase Newsletter October 2017 Recommended Offering: Compliance as a Service for Business as Usual While standards such as PCI DSS, ISO and SOC provide a benchmark for protecting data, criminals are always on the hunt for security vulnerabilities and malware to exploit
Dirty COW Vulnerability Advisory
Dirty COW Vulnerability Advisory This is a security advisory on the Dirty COW Vulnerability. What is Dirty COW Vulnerability? Dirty COW is a privilege escalation vulnerability in the Linux Kernel. The Dirty COW vulnerability allows attackers to gain root access to servers and take control
ControlCase to present at PCI Community Meetings
ControlCase Newsletter September 2016 ControlCase to present at PCI Community Meetings ControlCase will present on "Balancing Security and Compliance" at the North America and Europe PCI Community Meetings this fall. The ControlCase presentations will provide insight into the current state and
Advisory on Badlock Vulnerability
Advisory on Badlock Vulnerability This is a security advisory on the Badlock Bug. What is Badlock? Samba is an important component to seamlessly integrate Linux/Unix Servers and Desktops into Active Directory environments. It can function both as a domain controller and as a regular domain
Cross-protocol attack on TLS using SSLv2 (DROWN Vulnerability)
Cross-protocol attack on TLS using SSLv2 (DROWN Vulnerability) (CVE-2016-0800) This is a security advisory on the DROWN Attack (CVE-2016-0800). What is DROWN Attack (CVE-2016-0800). DROWN, stands for "Decrypting RSA with Obsolete and Weakened eNcryption", is a serious vulnerability that