We heard your feedback – and we have made the PCI SSC Global Content Library more accessible than ever before!
The Four “C’s” of eDiscovery Project Management
To solve organizations’ most challenging eDiscovery matters requires sophisticated organizations deploying advanced technologies and refined workflows. But above all else, solving such problems requires amazing “problem solvers.” At the heart of most projects, these problem solvers carry the often unglamorous title – “project manager.” An eDiscovery project manager goes well beyond just someone tracking status […]
The post The Four “C’s” of eDiscovery Project Management appeared first on TCDI.
The Core Skill of Talking to AI
There’s a really popular idea going around right now around renaming prompt engineering to context engineering, and they’re saying that this is because context engineering better captures the true nature of what we’re trying to do with AI.
So I think t…
How to Secure Your Home’s Perimeter
In a study by the University of North Carolina, 41% of burglars admitted their crimes were opportunistic. So, how can you remove the opportunity to be robbed? Start with the perimeter of your home. The perimeter of your property can either invite burglars in or ward them off. To protect your family and property here […]
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
CVE-2020-11023 JQuery Cross-Site Scripting (XSS) Vulnerability
These types of vulnerabilities are frequent attack vect…
CISA Releases Six Industrial Control Systems Advisories
CISA released six Industrial Control Systems (ICS) advisories on January 23, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
ICSA-25-023-01 mySCADA myPRO Manager
ICSA-25-0…
Sending billions of daily requests without breaking things with our rate limiter
At Detectify, we help customers secure their attack surface. To effectively and comprehensively test their assets, we must send a very high volume of requests …
The post Sending billions of daily requests without breaking things with our rate limiter appeared first on Blog Detectify.
The evolving landscape of data privacy: Key trends to shape 2025
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams
Will Trump Focus on the Western Hemisphere?
Chris, Zack, and Melanie got together to talk about the second Trump administration’s agenda in the Western Hemisphere. What interests does the United States have in Latin America? Should the United States be pushing back on China’s activities in the r…
Start Making Sense: Strategy and Grand Strategy in the Trump Administration
As he has told us many times, Donald Trump knows a lot about winning. But for all we know about the man and his methods, we still don’t know how he thinks about winning wars. Trump bellows and blusters, but we don’t know how he would lead America…