Midstream Connect: Hackers Intensify Assault On Industry

Jay McMickle, Security Principal Consultant, details the rapidly expanding cyber threat to midstream control systems and what companies need to do to keep their operations secure. Watch the full...

The Key to Selecting a Managed Services Partner

By Brian DiPaolo, Director of Strategic Services
I'm often asked by companies I talk to, what are the key things that I need to look for when selecting an MSP? It's not always a simple answer, but...

Encryption Works Both Ways – Is Your Network Protected?

By Jack Wehman, Technical Editor 

Alex Vasquez, Security Solutions Architect

Companies have always tried to watch the data that flows in and out of their networks – because it’s impossible to secure...

What's New with PCI 3.2 [Webinar]

Accudata has been a QSA for more than a decade and has performed over 30 PCI DSS assessments in the past 12 months. We currently have 10 QSAs on staff with an average tenure at Accudata of six years.

PCI 3.2 [Infographic]

Accudata’s PCI QSAs have compiled a helpful summary of the evolving requirements in PCI 3.2. Our QSA team is ready to offer guidance for compliance. To learn more visit ...

2017 Expert Predictions

Accudata’s Experts provide their top recommendations for keeping up with the pace of change in 2017. From the top security concerns and trending technologies, to business insights and hybrid cloud...

DR/BC Planning: Start Preparing Now

By Michael Lay, Advisory Services Principal Consultant

Accudata's Changing Lives One Wish at a Time

2016 was an incredible year of giving back for the Accudata Systems family.  Each quarter, the Accudata Charity Committee challenged our employees with a different initiative to assist local...

Oil & Gas Update: Ransomware Poses Cybersecurity Threat

As the oil and gas industry continues to utilize automation and Internet of Things technology, the number of cyber attacks, including Ransomware, are expected to keep rising, putting organizations at...

How White Hat Hackers Can Help You Fight Back

As social engineering becomes significantly more prevalent, it’s crucial to improve how organizations detect and respond to issues before an attack penetrates data and systems.

1 ...
2 3 4 5 6
... 8

Leave a Reply

Your email address will not be published. Required fields are marked *