NIST Moves on Sweet32 - 3DES, Blowfish, and Others - Mostly Unsafe | blog,pci,cryptography | Control Gap
Now is the time to stop using 64-bit block length ciphers such as 3DES (TDEA) and Blowfish in...
1 min read
David Gamey
:
Oct 7, 2021 10:07:00 PM
PCI DSS can be hard and not preparing for it just makes things harder. Following this advice is guaranteed to make it both more exciting and painful.
Seriously, if you want your assessment to be smooth and boring you may find these articles useful.
Original Publication: 2021-10-07
Updated PCI FAQ & Learn More links: 2023-06-16
Compliance can seem as dry as toast. Normally, it only gets exciting when things go wrong like when you find problems during an annual assessment, facing a looming deadline, with senior management breathing down your neck expecting a pass. Last minute discovery of problems gets extremely stressful. Failure becomes an option. Remediation is not guaranteed and can often be risky, sub-optimal, and expensive.
PCI DSS has 12 high-level requirements and over 250 sub-requirements each of which is an opportunity for failure. The kinds of challenges we describe are often avoidable and manageable. After all, PCI is an open book exam and there should be no excuse for not being prepared. If you are struggling with business-as-usual compliance, or have challenges, we can help.
David Gamey :
Jul 19, 2017 12:00:00 AM
Now is the time to stop using 64-bit block length ciphers such as 3DES (TDEA) and Blowfish in...
David Gamey :
Nov 29, 2016 12:00:00 AM
Earlier this month the PCI Security Standards Council published a new document as part of the...
David Gamey :
Oct 4, 2018 12:00:00 AM
In case you missed it, Facebook has had some issues recently and its only getting uglier. Catch...