Resources
Oregon Zoo Data Breach Exposes Payment Card Information
The Oregon Zoo's recent data breach serves as a stark reminder of the urgent need for robust cybersecurity measures in today's digital landscape. With over 117,000 payment card details potentially compromised, this ...
The Urgent Need to Get MOVING for PCI DSS v4.0 Compliance
With the March 2025 deadline for PCI DSS v4.0 compliance looming, businesses face the challenge of adapting to over 50 new security requirements. Among these, eSkimming protections are crucial for safeguarding online ...
Navigating PCI DSS 4.0: Insights from Industry Experts on Client-Side Security
With the March 2025 PCI DSS 4.0 deadline looming, organizations face new challenges, particularly in securing against eSkimming threats. At a recent Source Defense roundtable, industry experts shared crucial insights on navigating ...
The Enterprise Identity Universe: Users, Non-Humans, and Consumers [Infographic]
2 min read Journey with us through the identity cosmos, where understanding and safeguarding both humans and non-humans is mission-critical. The post The Enterprise Identity Universe: Users, Non-Humans, and Consumers [Infographic] appeared ...
Critical Security Update for Adobe Commerce (Magento) Users
In the rapidly evolving world of e-commerce, security remains a top priority. As part of our ongoing commitment to safeguarding our clients, we are bringing an important update to your attention regarding ...
Polyfill – Additional Analysis and Discovery: Signs of PII and Credential Harvesting, Broad Exposure through Digital Supply Chain
With the introduction of PCI DSS 4.0, merchants are now grappling with new requirements that aim to enhance the security of cardholder data. At a recent roundtable hosted by Source Defense, industry ...
Navigating the New PCI DSS 4.0 Requirements: Key Takeaways from Industry Experts
With the introduction of PCI DSS 4.0, merchants are now grappling with new requirements that aim to enhance the security of cardholder data. At a recent roundtable hosted by Source Defense, industry ...
Is Your Approach to Workload Identity and Access Management Mature Enough? [Flow Chart]
2 min read Take this self-assessment to guide you toward uncovering potential weaknesses with your strategy for securing workload connections. The post Is Your Approach to Workload Identity and Access Management Mature ...
The PCI Dream Team Discusses PCI DSS 4.0 and Payment Page Security
Last week Source Defense gathered hundreds of the world’s largest merchants, Payment Service Providers, QSACs and Card Associations to hear from a prominent group of leading thinkers in compliance and data security ...
Real-Life Examples of Workload Identity Breaches and Leaked Secrets – and What to Do About Them (Updated Regularly)
7 min read Identity-related breaches involve workloads more than ever, and that trend should continue. Here is a catalog of those incidents, with advice for mitigating the risk. The post Real-Life Examples ...