Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

12/14/2010
03:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trustwave Joins PCI Security Standards Council Forensic Investigator Program

New program simplifies hiring of and working with forensics experts

Chicago (December 14, 2010) - Trustwave, a leading provider of information security and compliance solutions, announced today that it has joined the PCI Security Standards Council Forensic Investigator Program and is now represented on the Council’s centralized listing of approved investigators.

The PCI SSC Forensic Investigator (PFI) program aligns industry requirements for identifying and approving forensic investigators to ensure the consistency and quality of their services to compromised entities. The SSC will manage a centralized public listing of PCI Forensic Investigators that are subject to the Council’s quality assurance reviews. Organizations requiring forensic investigative services can now consult a single central resource recognized by each payment card brand.

As a PCI Forensic Investigator, Trustwave assists organizations in determining if and how payment card data has been obtained by unauthorized third parties. Further information on Trustwave services can be found at www.trustwave.com.

“The PCI Security Standards Council is committed to providing merchants, service providers and financial institutions with high quality resources to protect against, detect and understand threats to their card data environments,” said Bob Russo, general manager, PCI Security Standards Council.” The Council is pleased to welcome Trustwave to the PCI Forensic Investigator program.”

“Having been a Qualified Incident Response Assessor for the card brands for almost 10 years, Trustwave has the experience and expertise to help merchants and processors understand how a breach has affected an environment and the steps to take to secure their infrastructure,” said Nicholas J. Percoco, senior vice president and head of SpiderLabs, Trustwave’s advanced security team. “We’re proud to be one of the first incident response teams to be named to the PCI PFI program and look forward to working more closely with the Council and providing our expertise to help secure card data environments.”

“Cyber criminals won’t be deterred from finding unsecure networks to siphon credit card data,” said Robert J. McCullen, chairman and CEO of Trustwave. “Bringing together the PCI DSS with the PCI PFI will provide businesses with a single educational resource that helps drive awareness of critical card data security.”

About PCI Security Standards Council

The mission of the PCI Security Standards Council is to enhance payment account security by driving education and awareness of the PCI Data Security Standard and other standards that increase payment data security.

The PCI Security Standards Council was formed by the major payment card brands American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. to provide a transparent forum in which all stakeholders can provide input into the ongoing development, enhancement and dissemination of the PCI Data Security Standard (DSS), PIN Transaction Security (PTS) requirements and the Payment Application Data Security Standard (PA-DSS). Merchants, banks, processors and other vendors are encouraged to join as participating organizations. For more information, please visit www.pcisecuritystandards.org

About Trustwave

Trustwave is the leading provider of on-demand and subscription-based information security and payment card industry compliance management solutions to businesses and government entities throughout the world. For organizations faced with today’s challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its flagship TrustKeeper' compliance management software and other proprietary security solutions. Trustwave has helped thousands of organizations—ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers—manage compliance and secure their network infrastructure, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia. For more information, visit https://www.trustwave.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2021-20622
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2020-5626
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
CVE-2021-3142
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...