Is Stripe PCI Compliant?
Is Stripe PCI Compliant?

Stripe is a very popular payment service platform that makes … Read More
Difference between Personal Data and Sensitive Personal Data
Difference between Personal Data and Sensitive Personal Data

Personal data is today widely recognized as a valuable asset. Due … Read More
Importance of SOC2 Security Awareness Training Program
Importance of SOC2 Security Awareness Training Program

Cyber Security has always been viewed as the responsibility of … Read More
Safety Detective – Interview With Narendra Sahoo
Safety Detective – Interview With Narendra Sahoo

Narendra Sahoo (PCI QSA, PCI QPA, CISSP, CISA, and CRISC) … Read More
Importance of Working Papers in an Audit
Importance of Working Papers in an Audit

Audit working papers are an integral part of all audit … Read More
PCI SAQ – Which one is applicable to your Business
PCI SAQ – Which one is applicable to your Business

PCI Self-Assessment Questionnaires (SAQs) are like a checklist for Merchants … Read More
What is Red Team Assessment? How is it different from Penetration Testing?
What is Red Team Assessment? How is it different from Penetration Testing?

Today, organizations are more prone to Cyber security threats than … Read More
Guide to GDPR Compliance Audit
Guide to GDPR Compliance Audit

GDPR Audit is an evaluation process examining organization compliance to … Read More
QSA in PCI DSS Compliance & Audit
QSA in PCI DSS Compliance & Audit

An organization from the Digital Payment Industry will have definitely … Read More
Guide For The Transition From PA DSS To PCI SSF
Guide For The Transition From PA DSS To PCI SSF

Payment Application Data Security Standard was launched in the year … Read More
WEBINAR: Best Practices in Breach Identification, Investigation, and Notification
WEBINAR: Best Practices in Breach Identification, Investigation, and Notification

Data Breach is one of the worst nightmares that organizations … Read More
Consumer Rights Under CDPA
Consumer Rights Under CDPA

Virginia became the second state in the US to enact … Read More
How to Create an Effective Business Continuity Plan?
How to Create an Effective Business Continuity Plan?

Listen Audio Version What is a Business Continuity Plan? A … Read More
What are Complementary User Entity Controls in SOC Reports?
What are Complementary User Entity Controls in SOC Reports?

User Control considerations have for long been a significant part … Read More
Multi-Tier Cloud Security Singapore Standard (SS584)
Multi-Tier Cloud Security Singapore Standard (SS584)

The Multi-Tier Cloud Security (MTCS) Singapore Standard (SS) also known … Read More
Importance of Sampling in the Audit Process
Importance of Sampling in the Audit Process

 In a compliance audit process, forming an audit opinion or … Read More