Vertical Industries  >   Financial Services Industry  >  

Credit Card Industry

RSS Feed    Add to Google    Add to My Yahoo!
Credit Card IndustryReports
 
Understanding Your PCI DSS Guidelines: Successes and Failures
sponsored by SearchSecurity.com
EGUIDE: This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

SearchSecurity.com

Leverage Security Intelligence For Financial Services Institutions
sponsored by IBM
WHITE PAPER: In this resource, discover how financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Profiting from PCI Compliance
sponsored by IBM
WHITE PAPER: This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
Posted: 13 Mar 2009 | Published: 01 Sep 2007

IBM

LogRhythm and PCI Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

LogRhythm, Inc.

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Achieving PCI Compliance in Complex Payment Networks
sponsored by LogLogic, Inc.
WHITE PAPER: Discover how next generation log management and intelligence (LMI) reduces the cost and complexity of PCI compliance and how using IT controls such as COBIT, ITIL and ISO answers many compliance mandates.
Posted: 13 Nov 2006 | Published: 01 Jul 2006

LogLogic, Inc.

PCI DSS compliance 101
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
sponsored by IBM
PRODUCT LITERATURE: High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
Posted: 03 May 2010 | Published: 03 Feb 2010

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement