{"id":10056,"date":"2015-08-25T12:00:44","date_gmt":"2015-08-25T19:00:44","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10056"},"modified":"2015-08-25T12:41:41","modified_gmt":"2015-08-25T19:41:41","slug":"watch-compensating-controls-for-increased-security","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/08\/watch-compensating-controls-for-increased-security\/","title":{"rendered":"Watch: Compensating Controls for Increased Security"},"content":{"rendered":"<p class=\"p1\">We all\u00a0regularly\u00a0see the news about credit card data theft and undermined consumer confidence. But what steps is your organization taking to protect yourself? Investing in your network security for PCI compliance?<\/p>\n<p class=\"p1\">If so, you\u2019re not alone \u2013 but being compliant does not translate into protection against advanced cyberattacks. After all, PCI DSS was established before advanced endpoint technology existed, and patching is no longer the only - or best - way to ensure protection from known vulnerabilities.<\/p>\n<p class=\"p1\"><!--more--><\/p>\n<p class=\"p1\">This\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/resources\/webcasts\/pci-compliance-compensating-controls.html\" target=\"_blank\"><span class=\"s1\">on-demand webinar<\/span><\/a>\u00a0examines effective compensating control to prevent unknown exploits, which not only meets but exceeds PCI DSS requirements. The result? A stronger security posture that takes basic PCI compliance to an even deeper level of protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all\u00a0regularly\u00a0see the news about credit card data theft and undermined consumer confidence. But what steps is your organization taking to protect yourself? Investing in your network security for PCI compliance? If &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,6],"tags":[1101,97],"coauthors":[716],"class_list":["post-10056","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-pci-compliance","tag-pci-dss","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10056"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10056\/revisions"}],"predecessor-version":[{"id":10063,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10056\/revisions\/10063"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10056"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}