Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Payment Card Industry Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Payment Card Industry ComplianceReports
 
Three Steps to PCI Compliance in the Cloud
sponsored by SearchSecurity.com
EGUIDE: PCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

SearchSecurity.com

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Mobile NFC in Retail
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the GSMA explains the opportunities for NFC Mobile communications in retail.
Posted: 09 Nov 2012 | Published: 01 Nov 2012

ComputerWeekly.com

PCI DSS Questions Answered: Solutions To Tough Compliance Problems
sponsored by Pwine Express
WHITE PAPER: In this expert Q&A, get expert answers to the compliance and security issues that are most affecting the payment card industry today.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Pwine Express

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This whitepaper shares five important practices to follow in order to make sure data is properly secured and monitored in a PCI-DSS compliant fashion.
Posted: 10 Oct 2014 | Published: 10 Oct 2014


Compliance Driven Security
sponsored by Dell, Inc.
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Passing a PCI Audit: A Global Perspective on Security Payment Card Data
sponsored by IBM
EGUIDE: SearchSecurity.com presents a comprehensive guide on how to pass a PCI audit. Our experts examine tactics that help companies achieve PCI compliance and offers advice on the steps you can take to make the audit process less burdensome.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

IBM

Winning the PCI Compliance Battle
sponsored by Qualys
WHITE PAPER: This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS.
Posted: 17 Oct 2011 | Published: 17 Oct 2011

Qualys

May Issue of Information Security Magazine: Data Protection: Going the Distance
sponsored by Information Security Magazine
EZINE: This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time.
Posted: 05 May 2011 | Published: 05 May 2011

Information Security Magazine

Healthcare and Compliance - The New Reality
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper outlines the three most important mandates for Healthcare today.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement