Will Target Breach Prompt Retailers to Raise the Security Bar?

Compliance vs security, wireless PCI

Did 2013 have to end with the somber news of a big credit card security breach? But it did! It is reported that 40 million credit cards were compromised in the security breach in stores of a major U.S. retailer Target. This is only a shade second to the earlier TJX breach in which 45 million credit cards… Read More

Going Beyond the Checkmark: All Things PCI

Beyond the PCI checkmark

AirTight’s compliance with the PCI Data Security Standards (DSS) continues to be at the heart of our initiatives to secure the retail environment. We remain focused on enhancing and going beyond the standards, which has been our mission since day one. Lately we’ve been upping our PCI activities. Check out our latest thinking and developments… Read More

Why retailers embrace cloud for Wi-Fi access, PCI and wireless security

In-Store Wi-Fi

Retailers are increasingly looking to deploy Wi-Fi in their stores. They want to provide guest Wi-Fi to their patrons and also want to deploy in-store applications such as wireless POS and printers, wireless kiosks, wireless digital signage, and HQ network access over Wi-Fi. Coupled with these business drivers there is also a wireless PCI compliance… Read More

AirTight satisfies PCI wireless scanning requirement in under 5 minutes

Wireless PCI Compliance in just 5 Minutes This new product video from AirTight Networks shows how easy it is to automate your wireless PCI vulnerability scanning. AirTight SpectraGuard Online can be configured and running in as little as 5 minutes and 3 easy steps. AirTight eliminates the need to send staff to remote locations with… Read More

Cost Stifles PCI DSS Compliance, Many Perceive Wireless as Top Threat: New Survey Finds

An interesting survey on PCI DSS compliance was recently published by the Ponemon Institute.  There are many interesting findings in the survey some of which I summarize here. One thing that strongly comes out is that though PCI DSS compliance is perceived as contributing to an organization’s security posture, cost factors are pestering. 60% of the… Read More