Business of Information Technology  >   Business Environment  >   Financing  >  

Bank Credit Cards

RSS Feed    Add to Google    Add to My Yahoo!
Bank Credit Cards Reports
 
How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by SearchSecurity.com
EBOOK: As online shopping burgeons, so does credit card fraud. We examine the latest credit card scams, and how technology and standards set by the Payment Card Industry can help.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchSecurity.com

Achieve and Maintain Compliance with the Payment Card Industry (PCI) Data Security Standard
sponsored by Ecora Software
WHITE PAPER: New white paper on PCI DSS - learn key steps for validating compliance with the PCI Data Security Standard, why companies should take PCI compliance seriously and secrets for successful PCI audits and consistent compliance.
Posted: 16 Jan 2007 | Published: 16 Jan 2007

Ecora Software

Rules, risk and the potential for profit in the world of Basel III
sponsored by IBM
WHITE PAPER: Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

Winning the PCI Compliance Battle
sponsored by Qualys, Inc.
WHITE PAPER: Learn about the payment card industry (PCI) including, participation and validation requirements, compliance requirements of PCI Data Security Standard, validation enforcement and the three important things to look for in a PCI network scanning service.
Posted: 19 Mar 2007 | Published: 01 Oct 2006

Qualys, Inc.

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization
sponsored by Intel
PRESENTATION TRANSCRIPT: Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

How Can Security Management Technologies Help Me with PCI Compliance?
sponsored by CA Technologies.
WHITE PAPER: Read this paper to learn how CA Security Management provides comprehensive and proven solutions to help achieve PCI compliance by ensuring the privacy of all confidential cardholder information, and detecting and correcting areas of potential exposure.
Posted: 02 Mar 2010 | Published: 11 Aug 2009

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement