<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: PCI and Social Proof</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=100" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=100</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Anton Chuvakin</title>
		<link>http://spiresecurity.com/?p=100&#038;cpage=1#comment-89</link>
		<dc:creator>Anton Chuvakin</dc:creator>
		<pubDate>Mon, 09 Feb 2009 18:07:06 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=100#comment-89</guid>
		<description><![CDATA[OK, that makes sense actually; on any curve we&#039;d always have a large # of co which are way, way below PCI DSS standard.
]]></description>
		<content:encoded><![CDATA[<p>OK, that makes sense actually; on any curve we&#8217;d always have a large # of co which are way, way below PCI DSS standard.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=100&#038;cpage=1#comment-88</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Mon, 02 Feb 2009 18:41:45 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=100#comment-88</guid>
		<description><![CDATA[@Anton -

Those folks are &quot;below the mean&quot; and when told (for example) that x thousand organizations are PCI compliant, should work to become compliant as well.

In any case, this came up because we know PCI-compliant companies are still hit with incidents and so in some respects PCI is not sufficient (we knew that, but tend to forget often). So, for these orgs, they are already compliant.
]]></description>
		<content:encoded><![CDATA[<p>@Anton -</p>
<p>Those folks are &#8220;below the mean&#8221; and when told (for example) that x thousand organizations are PCI compliant, should work to become compliant as well.</p>
<p>In any case, this came up because we know PCI-compliant companies are still hit with incidents and so in some respects PCI is not sufficient (we knew that, but tend to forget often). So, for these orgs, they are already compliant.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anton Chuvakin</title>
		<link>http://spiresecurity.com/?p=100&#038;cpage=1#comment-87</link>
		<dc:creator>Anton Chuvakin</dc:creator>
		<pubDate>Mon, 02 Feb 2009 17:11:15 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=100#comment-87</guid>
		<description><![CDATA[One logical flaw here:  &quot;the &quot;goal&quot; of being PCI-compliant the social norm ...&quot;

If you look at small to large orgs, you&#039;d notice that PCI is STILL (!) way, way ABOVE many organizations level of security.

We think of it as &quot;the minimum&quot;, they think about as &quot;WAY too much!&quot; :-(
]]></description>
		<content:encoded><![CDATA[<p>One logical flaw here:  &#8220;the &#8220;goal&#8221; of being PCI-compliant the social norm &#8230;&#8221;</p>
<p>If you look at small to large orgs, you&#8217;d notice that PCI is STILL (!) way, way ABOVE many organizations level of security.</p>
<p>We think of it as &#8220;the minimum&#8221;, they think about as &#8220;WAY too much!&#8221; <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_sad.gif' alt=':-(' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
</channel>
</rss>
