2 min read
SHA-1 Is Dead!
History The SHA-1 cryptographic hash function was introduced in 1995. Weaknesses began to be discovered in 2005, and in 2011 NIST deprecated SHA-1....
2 min read
History The SHA-1 cryptographic hash function was introduced in 1995. Weaknesses began to be discovered in 2005, and in 2011 NIST deprecated SHA-1....
This year, Control Gap Inc. has donated $2,500 to The Enbridge Ride to Conquer Cancer which has been supporting the Princess Margaret Cancer Centre...
Masking and truncation of cardholder data may seem the same on the surface (eg. 423456XXXXXX7890); however, each implies different functionality.
Cardholder data, aka CHD, comes from credit, debit, and prepaid cards bearing the logo of one of the PCI founding card brands. CHD includes the...
3 min read
In September 2016, Control Gap Inc. donated $5,000 to the University of British Columbia's Uganda Plastic Surgery Project. About the Mission...
5 min read
Call centers can be challenging places. They range from small and simple to large and complex. For many businesses they are a place where new...
In October 2016, Control Gap donated $5,000 to FCT in support of The Canadian Cancer Society's Relay for Life.
1 min read
Anyone who relies on the PCI FAQ site for guidance may have noticed some changes in the last few months. In fact if you bookmarked some of the links...
3 min read
Earlier this month the PCI Security Standards Council published a new document as part of the Point-to-Point Encryption (P2PE) program. This initial...