Target was the victim of a massive data breach that compromised at least 40 million credit and debit card accounts. Details are still trickling in, but the breach is believed to have taken place between Thanksgiving and December 15th, allowing cyberattackers to take full advantage of the holiday shopping season.
What are the possible attack vectors behind the Target heist and what should other retail companies do to protect themselves?
Listen to episode 114 of our Security Slice podcast and hear Lamar Bailey, Craig Young, Tyler Reguly and Tim Erlin discuss who discovered the breach, why the update cycle for point-of-Sale systems may play a key role, and why most retailers can’t use “PCI compliance” in the present tense.
Click Here to Listen to the Podcast
- Security Slice: Pushing Through the Development Disconnect
- Security Slice: Will Security Quizzes Help Banks – Yes or No?
- Security Slice: Can We Resuscitate Healthcare.gov?
- Security Slice: Peer Review for Code and Bug Bounties
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has also compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
This publication is designed to assist executives by providing guidance for implementing broad baseline technical controls that are required to ensure a robust network security posture.
The author, a security and compliance architect, examined each of the Controls and has distilled key takeaways and areas of improvement. At the end of each section in the e-book, you’ll find a link to the fully annotated complete text of the Control.
Download your free copy of The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities today.
Definitive Guide to Attack Surface Analytics
Pre-register today for a complimentary hardcopy or e-copy of the forthcoming Definitive Guide™ to Attack Surface Analytics. You will also gain access to exclusive, unpublished content as it becomes available.
* Show how security activities are enabling the business
* Balance security risk with business needs
* Continuously improve your extended enterprise security posture
Title image courtesy of ShutterStock