waves
ball1 ball2 ball3 ball4

Electric Car Chargers - A Hacker’s Dream or Fail-Safe? Are They in Scope for PCI DSS?

The rapid adoption of electric vehicles (EVs) has led to an equally rapid expansion of public and private vehicle-charging infrastructure. Charging stations are now commonly found in parking lots, shopping malls, offices, hotels, and other public spaces. Many of these charging stations support...

Protecting Your Payment Systems: The Role of External Vulnerability Scanning

Security for payment systems demands complete protection of cardholder information as its primary goal. Organizations invest heavily in firewalls, encryption, and monitoring systems, yet many fail to recognize that external vulnerability scanning is a fundamental requirement for PCI DSS compliance....

Navigating Compliance in a Rapidly Shifting IT and Security Landscape: Impacts on Global Entities

The payment security landscape has changed dramatically over the past decade with cloud-first architectures, the movement to remote workforces, API-driven payment systems, and increasingly sophisticated cybercrime, all of which have impacted how organizations process and protect cardholder data.

1 Cyber Valley Turns 5! Reflecting On The Journey Thus Far

With the outstanding levels of growth that 1 Cyber Valley has seen over the past 5 years, we have continuously had to face the challenge of how best to deliver our services to clients around the globe. As 1 Cyber Valley operates in five out of the six regions of work under the PCI DSS law, we...

2D QR Codes, the GS1 Digital Link Standard, and What Sunrise 2027 Means - Including Its Impact on PCI DSS

There is one technology that quietly and steadily slipped into our everyday life and has been a part of it ever since - we are talking about QR codes. From scanning a menu at a café to making a payment at a grocery store, 2D QR codes are everywhere.

Security Begins with People, Not Technology: The Real Defense Against Social Engineering

We are living in a hyper-connected world today, and our first thoughts are that firewalls, antivirus software, and endpoint protection are the tools that keep us secure. However, the reality is that most breaches do not come through a code exploit, but rather through a talk, a call, an email, or a...

The Rise of EMI Wallets in Singapore and What It Means for the Rest of Asia

Singapore now leading the digital payments sector across asia. The tech savvy citizens, the fast-moving digital economy, and the financial regulations, these have helped the country change how its citizens make payments, save the money and manage it.

Do We Need to Embed AI Policies Within the PCI DSS Framework?

In the UK, there is currently no direct legal requirement for companies to adopt a dedicated Artificial Intelligence (AI) policy. Yet, with AI now being rapidly integrated into business operations - particularly within payments - the question arises: should organisations start embedding AI...

A New Era of Trust: Why the RBI's PCI DSS Mandate is Reshaping India's Digital Payments

The start of a Digital NationMillions of transactions are being transformed daily by India's robust and dynamic digital payment ecosystem. Thanks to convenience and innovation, digital transactions have taken over from the busy marketplaces of our cities to the most rural areas of our nation. But...

Google’s Salesforce Breach: What Happened, Why it Matters and What APAC Businesses Can Learn

When Google confirms a data breach, the world listens. In August 2025, Google stated with a straight face that hackers had successfully broken into one of their Salesforce Customer Relationship Management instances, stealing structured business contact information. While the compromised data did...