Business of Information Technology  >   Business Environment  >   Financing  >  

Credit Cards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Bank Credit Cards, Charge Cards
DEFINITION: Chip and PIN is a UK government-backed initiative to implement the EMV (short for Europay, Mastercard and Visa) standard for smart payment cards. A similar effort is also underway in the Republic of Ireland. The name of this initiative stems from the presence of a semiconductor chip and associated circuitry in the smart card, which is used in tandem with a PIN (personal identification number) . In  … 
Definition continues below.
Credit Cards Reports
1 - 25 of 41 Matches Previous Page  |  Next Page
How to make PCI DSS 3.0 compliance an every day practice or A guidebook to successful PCI DSS 3.0 compliance
sponsored by Alert Logic
WHITE PAPER: View this white paper to explore the evolution of security compliance from an annual event to an everyday practice and how to drill down the details.
Posted: 17 Mar 2015 | Published: 05 Nov 2014

Alert Logic

Special Feature: Bank Card Courier Scams
sponsored by ESET
WHITE PAPER: This white paper describes the dangers of fraudulent phone calls and what to look out for when receiving one.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

ESET

Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by SearchSecurity.com
EBOOK: As online shopping burgeons, so does credit card fraud. We examine the latest credit card scams, and how technology and standards set by the Payment Card Industry can help.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchSecurity.com

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
BOOK: This eBook will teach you how to secure your POS systems, minimize your risk, achieve PCI DSS compliance, protect cardholder data, and more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

Bit9 + Carbon Black

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Corporation
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Are Your Everyday Business Activities Creating Tax Risk?
sponsored by Avalara
WHITE PAPER: This white paper discusses how to spot risk and improve compliance in 7 key business functions and explains the benefits of integrating and automating sales tax compliance in your ERP.
Posted: 07 Jan 2015 | Published: 02 Dec 2014

Avalara

Payment Behaviour in Australia: May 2014 Findings
sponsored by Hewlett-Packard Company
RESEARCH CONTENT: Learn where future investment in payment technologies will be required, and get insight into the state of consumer payments in Australia, with findings on payment method trends and changes in consumer spending behaviour. Learn about consumer attitudes toward payment methods, and the likely effect on the future of the payments system. And much more!
Posted: 22 May 2014 | Published: 01 May 2014

Hewlett-Packard Company

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

E-Guide: PCI DSS 2011: Key themes to watch
sponsored by SearchSecurity.com
EGUIDE: This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011

SearchSecurity.com

How to keep your confidential information safe
sponsored by Informatica
DATA SHEET: Access this concise resource to uncover the key features of a data masking tool, to ensure the security of your organization's reputation and confidential information.
Posted: 08 May 2014 | Published: 31 Dec 2013

Informatica

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Rules, risk and the potential for profit in the world of Basel III
sponsored by IBM
WHITE PAPER: Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

Toward Active Management of Counterparty Credit Risk with CVA
sponsored by IBM
WHITE PAPER: To support this new and rapidly developing trading function, organizations must invest in flexible systems that can adapt to incorporate CCR best practices.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Reducing PCI DSS Scope with the First Data® TransArmor® Solution
sponsored by First Data Corporation
WHITE PAPER: Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization
sponsored by Intel
PRESENTATION TRANSCRIPT: Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Achieving PCI compliance with Dell SecureWorks' security services
sponsored by Dell, Inc.
WHITE PAPER: It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.
Posted: 18 May 2011 | Published: 18 May 2011

Dell, Inc.

QSA Tokenization Broker Assessors Guide
sponsored by Intel
WHITE PAPER: Tokenization has become popular as a way of strengthening the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance. In this white paper, learn about a tokenization approach that can reduce compliance costs in both data center and private cloud environments.
Posted: 10 May 2011 | Published: 10 May 2011

Intel

Log Management Best Practices: Six Tips for Success
sponsored by Novell, Inc.
EGUIDE: The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Posted: 11 Mar 2011 | Published: 11 Mar 2011

Novell, Inc.

SonicWALL PCI Compliance Solution Brief
sponsored by SonicWALL
WHITE PAPER: The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers
sponsored by Qualys
WHITE PAPER: The PCI Data Security Standard requirements apply to all payment card network members, merchants and service providers that store, process or transmit cardholder data. This guide will outline the six core requirement categories, participation and validation requirements, how to select a PCI networking testing service and more.
Posted: 11 Jan 2011 | Published: 11 Jan 2011

Qualys
1 - 25 of 41 Matches Previous Page    1 2    Next Page
 
CREDIT CARDS DEFINITION (continued): … Chip and PIN is a UK government-backed initiative to implement the EMV (short for Europay, Mastercard and Visa) standard for smart payment cards. A similar effort is also underway in the Republic of Ireland. The name of this initiative stems from the presence of a semiconductor chip and associated circuitry in the smart card, which is used in tandem with a PIN (personal identification number) . In use, the smart card is placed into a PIN pad terminal or modified swipe-card reader, which accesses the chip in the card. The user enters a 4-digit PIN that is checked against the information stored on the card. If the entered PIN matches the stored value, the transaction is permitted to proceed.Chip and PIN went through a pilot test in Northampton starting in May 2003 and was rolled out nationwide in 2004. In 2005, retailers became responsible for fraudulent credit card purchases. This event spurred wholesale adoption of new POS (point of sale) systems that incorporated EMV support.
Credit Cards definition sponsored by SearchSecurityUK.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement