Skip to the main content.
Contact

Blog

Be in touch with our latest news

2 min read

This Week's [in]Security - Issue 4

Welcome to This Week’s [in]Security. We’ve collected and grouped together a selection of this week’s news and opinion links on security and privacy...

Read More >

2 min read

This Week’s [in]Security – Issue 3

Welcome to This Week’s [in]Security. We’ve collected and grouped together a selection of this week’s news and opinion links on security and privacy...

Read More >

3 min read

3 Ways 8-Digit BIN Ranges May Impact PCI Compliance

New 8-digit Bank Identification Numbers (BIN) could complicate PCI truncation rules and create compliance headaches for those required to maintain...

Read More >

3 min read

This Week’s [in]Security - Issue 2

Welcome to This Week’s [in]Security. We’ve collected and grouped together a selection of this week’s news and opinion links on security and privacy...

Read More >

2 min read

This Week's [in]Security

Welcome to our first issue of This Week's [in]Security. We've collected and grouped together a selection of this week's news and opinion links on...

Read More >

1 min read

What The CIA WikiLeaks Dump Has In Common With PCI Compliance

In recent news, WikiLeaks exposed a huge trove of CIA documents. Journalists and bloggers will of course have a field day with this and the general...

Read More >

2 min read

SHA-1 Is Dead!

History The SHA-1 cryptographic hash function was introduced in 1995. Weaknesses began to be discovered in 2005, and in 2011 NIST deprecated SHA-1....

Read More >

2017 Toronto Ride To Conquer Cancer

This year, Control Gap Inc. has donated $2,500 to The Enbridge Ride to Conquer Cancer which has been supporting the Princess Margaret Cancer Centre...

Read More >

What Is The Difference Between Masking And Truncation In PCI Compliance?

Masking and truncation of cardholder data may seem the same on the surface (eg. 423456XXXXXX7890); however, each implies different functionality.

Read More >