Password Palpitations — The Ongoing Threat of LM Hashing
How do we protect sensitive information from prying eyes on our computers and networks? The simple answer is to deploy controls to monitor and restrict the transfer or viewing of sensitive data on those shared resources.
PCI DSS 3.0 and Two-Factor Authentication
PCI DSS 3.0 was released in November 2013. What does the guidance say regarding two-factor authentication and how does it differ from PCI DSS 2.0?