• Skip to primary navigation
  • Skip to main content
  • Skip to footer
ControlCase No Tag LOGO md

ControlCase

IT Certifications, Continuous Compliance and Cybersecurity Services Provider

  • Company
    • About Us
    • Careers
    • Locations
    • Team
  • Industries
    • Business Process Outsourcing
    • Cloud Service Providers
    • Retail
    • Telecom | Entertainment
    • Managed Service Providers
  • Certifications
    • PCI DSS Certification
    • CSA STAR Certification
    • GDPR Assessment
    • HIPAA Assessment
    • HITRUST Certification
    • ISO 27001 Certification
    • FedRAMP 3PAO Services and NIST 800-53
    • CMMC Certification
    • MARS-E Assessment
    • PCI SSF
    • P2PE Certification
    • SOC2 Report
  • Solutions
    • Continuous Compliance Solution
    • One Audit
    • Card Data Discovery Software
    • Data Security Rating
  • Testing
    • Application Reviews
    • Application Security Training
    • Code Reviews
    • Card Data Discovery
    • External Vulnerability Scans
    • Firewall Security Reviews
    • Internal Vulnerability Scans
    • Log Monitoring
    • Penetration Testing
  • Resources
    • Events
    • News
    • Webinars
    • Courses
    • Blog
    • Tools
    • Become a Partner
  • Contact Us
  • English
    • Español (Spanish)

Anil Prajapati

controlcase-webinar-pci-pin-security-key-management-compliance

ControlCase Validates HCD International against HITRUST CSF

ControlCase Newsletter January 2016 ControlCase Validates HCD International against HITRUST Common Security Framework (CSF) As more and more organizations are required to obtain CSF certification, ControlCase provides a comprehensive solution for assessing risk within the healthcare

Read More

controlcase-event-mastercard-asia-pacific-cybersecurity-leadership-summit-rectangle

Cloud Security at MasterCard Global Risk Leadership Conference

ControlCase CEO Speaks on Cloud Security at MasterCard Global Risk Leadership Conference ControlCase CEO Speaks on Cloud Security at MasterCard Global Risk Leadership Conference Discussed key points on how to keep sensitive information secure as organizations move to the cloud ControlCase is

Read More

Security Fundamentals: File Integrity Monitoring

Logjam Vulnerability Advisory

Logjam Vulnerability Advisory This is a security advisory on the "Logjam Vulnerability." What is Logjam Attack The Logjam vulnerability is a weakness that left secure sites open to attack. A weakness in encryption protocol called Diffie-Hellman is letting attackers downgrade certain

Read More

PCI DSS checklist by ControlCase

Simplify Compliance with Multiple Regulations using “One Audit”

ControlCase Newsletter April 2015 ControlCase Announces "One Audit" to Simplify Compliance with Multiple Regulations The ControlCase One Audit service provides the ability for organizations to perform a single audit and certify/comply to multiple regulations including but not limited to PCI

Read More

GHOST Vulnerability Advisory

GHOST Vulnerability Advisory This is a security advisory on the "GHOST Vulnerability (CVE-2015-0235)." About the Vulnerability The GHOST vulnerability is a serious weakness in the Linux "glibc library". It allows attackers to remotely take complete control of the victim system. GHOST is a

Read More

webinars24

Windows OLE RCE – The Sandworm Exploit

Windows OLE RCE - The Sandworm Exploit This is a security advisory on the "Windows OLE Remote Code Execution Vulnerability" widely known as "The Sandworm" exploit. About the Vulnerability On October 14th, Microsoft released several Patches on the Patch Tuesday. The patches mainly address a

Read More

event21-1

SSL V3.0 Fallback – POODLE Advisory

SSL V3.0 Fallback - POODLE Advisory This is a security advisory on the "SSL V3.0 Fallback - POODLE." About the Vulnerability On October 14th, an attack affecting the SSLv3.0 protocol was disclosed. The attack named POODLE which is acronym for "Padding Oracle On Downgraded Legacy Encryption"

Read More

eventnews-2

ControlCase Advisory on the Shellshock Vulnerability

ControlCase Advisory on the Shellshock Vulnerability This is a security advisory on the "Shellshock" vulnerability. What is Shellshock Bourne Again Shell (bash) is a widely used shell on *NIX systems. It contains flaw that allows attacker to provide specially-crafted environment variables

Read More

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 23
  • Go to page 24
  • Go to page 25
  • Go to page 26
  • Go to Next Page »
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Footer

Connect

Corporate Headquarters
3975 FAIR RIDGE DR STE T25S-D
FAIRFAX, VA 22033

Send us a message

Call Us

Search

About Us

ControlCase is a United States based company, headquartered in Fairfax, Virginia with locations in North America, Europe, Latin America, Asia/Pacific, Australia and the Middle East to serve our clients globally.

Quick Links

  • Company
  • Careers
  • Locations
  • Covid-19 Notice

Certifications, Assessments and Reports

  • PCI DSS Certification
  • CSA STAR Certification
  • GDPR Assessment
  • HIPAA Assessment
  • HITRUST Certification
  • ISO 27001 Certification
  • FedRAMP and 3PAO Services
  • MARS-E Assessment
  • PCI SSF
  • P2PE Certification
  • SOC2 Report

© ControlCase LLC 2025 | Privacy Policy | Impartiality Statement | Legal Notices

  • English
    • Español (Spanish)
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}