PCI DSS

Home/Tag: PCI DSS

What is NESSUS and How Does it Work?

2021-01-18T11:20:10+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , , |

Nessus is a proprietary vulnerability scanner developed by Tenable, Inc. Tenable.io is a subscription-based service. Tenable also contains what was previously known as Nessus Cloud, which used to be Tenable’s Software-as-a-Service solution.  Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. In [...]

What is Network Vulnerability Scanning?

2021-01-13T09:34:02+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , |

Vulnerability management is a key responsibility of any IT security team or managed security service provider. This scanning is an inspection of the potential points of exploit on a computer or network to identify security holes. Vulnerability scanning is an integral component of vulnerability management. In fact, a scanner is an application that identifies and [...]

Network Monitoring and Performance Management (NPM) Tools – Part 3

2021-01-02T07:24:33+00:00Categories: Network Monitoring|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

In these four blogs, we are going to talk about the main features of a performance management tools and monitoring software and, as far as possible, compare some popular software in this area. In these four blogs, we are going to talk about the main features of a network management and monitoring software and, as [...]

How to Comply with PCI DSS

2020-09-09T06:59:01+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , |

This post presents How to comply with PCI DSS. This article is a summary from of the pcisecuritystandards.org website. With the following link: PCI DSS Quick Reference Guide For more info please refer to pcisecuritystandards.org We recommend you that before continuing, read this post. Each payment card brand maintains its own separate compliance enforcement programs [...]

Security Controls and Processes for PCI DSS Requirements

2020-09-09T07:03:35+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , |

We already have a post called PCI-DSS that you can read it here. Now, in this post, we are going to get acquainted with the security controls and processes required for a PCI-DSS implementation. This post presents the objectives of PCI DSS and related 12 requirements. This article is a summary from of the pcisecuritystandards.org [...]

Mobile Device Management (MDM) Solutions

2020-08-14T08:33:47+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , |

Mobile devices come with their own set of problems, such as unauthorized data access and data leakage, which highlights the importance of managing these devices. Mobile device management (MDM) is a software application for the administration of mobile devices, such as smartphones, tablet computers and laptops. MDM includes storing essential information about mobile devices, deciding [...]

What’s DLP?

2020-08-24T08:51:40+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , |

Data loss refers to an event in which important data is lost to the enterprise, such as in a ransomware attack. Data loss prevention (DLP) focuses on preventing illicit transfer of data outside organizational boundaries. Data loss prevention is a set of tools and processes used to ensure that sensitive data is not lost, misused, [...]

Rapid7 Products

2020-07-13T06:32:30+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Rapid7 Nexpose is a vulnerability scanner which aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. RAPID7 plays a very important and effective role in the penetration testing, and most pentesters use RAPID7. This paragraph is abbreviated from www.rapid7.com The following figure shows some of [...]

Go to Top