
PCI DSS – it takes a village
David Mundhenk and Ben Rothke show how the PCI Security Standards Council really wants PCI to succeed. Much to the chagrin of The National Retail Federation.

The National Retail Federation is dead wrong about PCI
Ben Rothke and David Mundhenk question why the National Retail Federation (NRF) is trying to lawyer-up on PCI.
Message in a PCI bottle - preserving message queue integrity
Final part in the series on achieving PCI compliance when dealing with message queues.

The secrets of Israeli information security innovation
In my previous piece I provided some insights on how Israel has become an information security innovation powerhouse. In closing the topic, I’ll share some insights from Gadi Tirosh who is a managing partner at Jerusalem Venture...

Israel government spurs innovation
See how Israel has become a leading player in the worldwide information security sector.

Without information security processes, you are flying blind
When done well, the creation of an information security process catalog can provide significant benefits for an enterprise.
Practical tips to ensure PCI DSS compliance when dealing with message queues
In this final piece, I will continue with some more detailed items on how to ensure PCI message queue compliance.
How to ensure PCI DSS compliance when dealing with message queues
To queue or not to queue, that is the PCI question – part 2 by Ben Rothke

CyberTech – The Golden Globes of information security
Here’s some of the most interesting firms I met with while at the CyberTech conference.
To queue or not to queue, that is the PCI question
In the first of this three-part series, I will detail issues surrounding message queuing and how to ensure it doesn’t break your PCI DSS compliance effort.

Live from Tel Aviv, it’s CyberTech
I attended the Cybertech Conference & Exhibition in Tel Aviv. Now that I have caught my breath, here’s my account.

How physicians can do no harm using social media
In this article, I’ll offer some practical advice on how physicians and others in healthcare can use social media without running afoul of their HIPAA compliance office.
Physicians and social media – where there’s no second opinion
A patient can post just about anything they want about a physician. But physician’s may be violating HIPAA if they reply to their patient via social media.
Ted Koppel’s new book tells a good story but lacks facts
In his new book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, Ted Koppel offers a lot of doomsday scenarios, but not enough facts to ensure that this is placed in the non-fiction section.

Why information security jobs go unfilled
In this 3-part series, I dealt with the issue of a shortage of people in the information security sector. In parts 1 & 2, I addressed why firms struggle to find quality information security staff. In this final segment, I’ll discuss...
Don’t use general recruiters in salary negotiations
In part 1, I addressed why firms struggle to find quality information security staff. In this segment, I’ll discuss how recruitment can help or hinder that, and get insights from noted information security recruiter Tracy Lenzner.

Prospective security employees see too many low-ball offers
In this 3-part series, I’ll deal with the issue of a shortage of people in the information security sector.
While there are a number of reasons why firms struggle to find good information security talent, I feel there are two...
Doing tokenization and cloud computing the PCI way
In our previous 2 parts to this article, we discussed various aspects of application security and PCI compliance. We conclude our series with a discussion of tokenization and cloud computing, and how to do it to make your PCI QSA...
PCI, it's all about the app
In the first part of a three-part series, we gave an introduction to the need for application security, and firms that have in-scope PCI applications have a lot to do to ensure PCI compliance. In this and the final part, Ben Rothke...