• Skip to primary navigation
  • Skip to main content
  • Skip to footer
ControlCase No Tag LOGO md

ControlCase

IT Certifications, Continuous Compliance and Cybersecurity Services Provider

  • Company
    • About Us
    • Careers
    • Locations
    • Team
  • Industries
    • Business Process Outsourcing
    • Cloud Service Providers
    • Retail
    • Telecom | Entertainment
    • Managed Service Providers
  • Certifications
    • PCI DSS Certification
    • CSA STAR Certification
    • GDPR Assessment
    • HIPAA Assessment
    • HITRUST® Certification
    • ISO 27001 Certification
    • FedRAMP 3PAO Services and NIST 800-53
    • CMMC Certification
    • MARS-E Assessment
    • PCI SSF
    • P2PE Certification
    • SOC2 Report
  • Solutions
    • Continuous Compliance Solution
    • One Audit
    • Card Data Discovery Software
    • Data Security Rating
  • Testing
    • Application Reviews
    • Application Security Training
    • Code Reviews
    • Card Data Discovery
    • External Vulnerability Scans
    • Firewall Security Reviews
    • Internal Vulnerability Scans
    • Log Monitoring
    • Penetration Testing
  • Resources
    • Events
    • News
    • Webinars
    • Courses
    • Blog
    • Tools
    • Become a Partner
  • Contact Us
  • English
    • Español (Spanish)

Anil Prajapati

February 15, 2018 9:30 PM - 10:15 PM IST

Data Discovery and PCI DSS

In this 45 minute webinar, ControlCase will discuss the following: What is Data Discovery Why Data Discovery PCI DSS requirements Need for Data Discovery in the context of PCI DSS Challenges in the Data Discovery space - Q&A

Read More

event21-1

January 11, 2018 9:30 PM - 10:15 PM IST

Continual Compliance Monitoring for PCI DSS, HIPAA, FERC/ NERC, and ISO 27001

In this 45 minute webinar ControlCase will discuss the following: PCI DSS, HIPAA, FERC/ NERC, and ISO 27001 requirements Why is continual compliance a challenge PCI DSS, HIPAA, FERC/ NERC, and ISO 27001

Read More

WEBINARS TEMPLATE

[fusion_builder_container hundred_percent="no" equal_height_columns="no" menu_anchor="" hide_on_mobile="small-visibility,medium-visibility,large-visibility" class="" id="" background_color="" background_image="" background_position="center center" background_repeat="no-repeat" fade="no"

Read More

2020-data-security-compliance-conf-banner

Dirty COW Vulnerability Advisory

Dirty COW Vulnerability Advisory This is a security advisory on the Dirty COW Vulnerability. What is Dirty COW Vulnerability? Dirty COW is a privilege escalation vulnerability in the Linux Kernel. The Dirty COW vulnerability allows attackers to gain root access to servers and take control

Read More

ControlCase Achieves PCI Qualified PIN Assessor Status ControlCase Achieves PCI Qualified PIN Assessor Status

ControlCase to present at PCI Community Meetings

ControlCase Newsletter September 2016 ControlCase to present at PCI Community Meetings ControlCase will present on "Balancing Security and Compliance" at the North America and Europe PCI Community Meetings this fall. The ControlCase presentations will provide insight into the current state and

Read More

controlcase-event-pci-europe-community-meeting

Advisory on Badlock Vulnerability

Advisory on Badlock Vulnerability This is a security advisory on the Badlock Bug. What is Badlock? Samba is an important component to seamlessly integrate Linux/Unix Servers and Desktops into Active Directory environments. It can function both as a domain controller and as a regular domain

Read More

controlcase-event-2019-cyber-security-summit

Cross-protocol attack on TLS using SSLv2 (DROWN Vulnerability)

Cross-protocol attack on TLS using SSLv2 (DROWN Vulnerability) (CVE-2016-0800) This is a security advisory on the DROWN Attack (CVE-2016-0800). What is DROWN Attack (CVE-2016-0800). DROWN, stands for "Decrypting RSA with Obsolete and Weakened eNcryption", is a serious vulnerability that

Read More

Security Fundamentals: File Integrity Monitoring

Logjam Vulnerability Advisory

Logjam Vulnerability Advisory This is a security advisory on the "Logjam Vulnerability." What is Logjam Attack The Logjam vulnerability is a weakness that left secure sites open to attack. A weakness in encryption protocol called Diffie-Hellman is letting attackers downgrade certain

Read More

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 26
  • Go to page 27
  • Go to page 28
  • Go to page 29
  • Go to Next Page »
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube

Footer

Connect

Corporate Headquarters
3975 FAIR RIDGE DR STE T25S-D
FAIRFAX, VA 22033

Send us a message

Call Us

Search

About Us

ControlCase is a United States based company, headquartered in Fairfax, Virginia with locations in North America, Europe, Latin America, Asia/Pacific, Australia and the Middle East to serve our clients globally.

Quick Links

  • Company
  • Careers
  • Locations
  • Covid-19 Notice
  • Manage Cookies
  • Your Privacy Choices

Certifications, Assessments and Reports

  • PCI DSS Certification
  • CSA STAR Certification
  • GDPR Assessment
  • HIPAA Assessment
  • HITRUST® Certification
  • ISO 27001 Certification
  • FedRAMP and 3PAO Services
  • MARS-E Assessment
  • PCI SSF
  • P2PE Certification
  • SOC2 Report

© ControlCase LLC 2026 | Privacy Policy | Impartiality Statement | Legal Notices

  • English
    • Español (Spanish)