Business of Information Technology  >   Business Management  >   Financial Management  >  

Credit Card Payment Processing

RSS Feed   
Credit Card Payment Processing Reports
 
Video: Decoding Magecart/Web Skimming Attacks
sponsored by Akamai Technologies
WEBCAST: Cyberthreat actors have taken note of the increased reliance on the internet due to COVID-19. More specifically, they are eyeing the sharp growth in online transactions. They are using web skimming, a hacking technique that injects malware onto a payment page to steal the payment information. Watch this webcast to learn more.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020

Akamai Technologies

Mobile Payments Using Host Card Emulation with NFC
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 11 May 2018 | Published: 11 May 2018

ComputerWeekly.com

Fair exchange protocols with anonymity and non-repudiation for payments
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Escaping PCI purgatory
sponsored by IBM
WHITE PAPER: IBM offers comprehensive solutions designed to take businesses through the entire PCI compliance process and continue to meet new requirements, supporting the next level of security. Read the white paper ‘Escaping PCI Purgatory’ to learn more.
Posted: 21 Sep 2009 | Published: 01 Feb 2009

IBM

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

How Outsourcing, Automation, and Mobile Tech are Changing the Payment Processing Game
sponsored by SearchHRSoftware
EBOOK: Accounts payable needs to be taken just as seriously as AP/AR pairing. View this resource to learn more about the risks and benefits of AP automation. Two varieties of AP automation include digitization of paper invoices and payment systems that are electronic from beginning to end.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

SearchHRSoftware

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Integration case study: Reduce time and cost of payment services
sponsored by IBM
WHITE PAPER: Scotiabank needed the right solution to help its corporate customers manage the complexity of their payment processes. In this case study, learn how, like Scotiabank, you can successfully reduce the time and cost of providing enhanced payment services with the right integrated payments service.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Realizing the True Value of Online Self-Service and E-Billing
sponsored by Oracle Corporation
PRODUCT LITERATURE: Customer service demands are overrunning companies today. In both business-to-consumer and business-to-business settings, product and service offerings are proliferating and customer interactions are multiplying. This white paper di...
Posted: 16 Jan 2007 | Published: 01 Aug 2005

Oracle Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info