March 16, 2015 By Bob Violino 2 min read

A bad trend among information security executives may be good news for cybercriminals. The majority of businesses — 80 percent — fail their interim Payment Card Industry Data Security Standard (PCI DSS) compliance assessment, leaving them open to potential attacks.

That’s according to the 2015 PCI Compliance Report by Verizon, which the firm released on March 12. The fourth annual report analyzes PCI compliance efforts and how they sync with data security breaches worldwide in a variety of industries.

The report encompasses three years of data and includes results from PCI assessments performed by Verizon PCI-qualified security assessors, who examined compliance efforts at large, multinational firms in more than 30 countries. The study includes analysis of each of the 12 PCI requirements.

Verizon says its research has shown for several years that companies victimized by data breaches tend to have lower-than-average compliance with PCI DSS controls.

One of the more telling findings of the latest PCI compliance report are that a mere 29 percent of organizations remain fully PCI DSS-compliant less than a year after being validated for compliance. On the positive side, nearly twice as many businesses received compliance validation during their interim review last year, in relation to 2013.

Companies need to take continuous compliance more seriously if they are to protect themselves against the kinds of attacks recently experienced by companies such as Home Depot and Sony Pictures Entertainment.

“Today’s cybersecurity landscape is constantly changing,” said Rodolphe Simonetti, managing director of professional services for Verizon Enterprise Solutions. “Compliance at [this] point in time isn’t sufficient to protect data. Putting the focus on making compliance sustainable is key. It must be a part of day-to-day activities within an organization’s greater security strategy.”

Among the areas in which companies typically fail with regard to PCI compliance, Simonetti says, are regularly testing security systems, maintaining secure systems and protecting stored data.

The recent rash of data breaches serves as a reminder of how important it is to maintain strong security practices, and organizations need to look at PCI DSS compliance as a key component of their cybersecurity and risk management strategy.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today