Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

PCI Compliance

RSS Feed   
PCI Compliance Reports
 
Data Protection and PCI Scope Reduction for Today's Businesses
sponsored by Micro Focus
WHITE PAPER: Tokenization is a method of data protection and audit scope reduction recommended by the PCI DSS Security Standards Council. However, merchants and service providers who have implemented it have encountered problems. In this white paper, learn about the SecureData platform with Secure Stateless Tokenization.
Posted: 30 Jan 2019 | Published: 30 Jun 2018

TOPICS: 
Micro Focus

Customer Data Security & PCI Compliance Best Practices
sponsored by Preferred Payments
WHITE PAPER: With the rise of database breaches and fraudulent credit card scams, new security requirements are becoming mandatory for SMBs. This checklist will help you understand what actions you need to take in order to avoid detrimental breaches and penalties. Inside, learn what to do to ensure your business has the best protection should a breach occur.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

TOPICS: 
Preferred Payments

LogRhythm and PCI Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

TOPICS: 
LogRhythm, Inc.

PCI DSS: Next-Generation Data Security, Storage and Integrity
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

TOPICS: 
SearchSecurity.com

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

TOPICS: 
Information Security Magazine

PCI-Compliant Cloud Reference Architecture
sponsored by HyTrust
WHITE PAPER: Check out this resource to learn how Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS).
Posted: 13 Jul 2011 | Published: 13 Jul 2011

TOPICS: 
HyTrust

Buyer’s Guide to Antimalware
sponsored by Panda Security
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 30 Oct 2009 | Published: 27 Oct 2009

TOPICS: 
Panda Security

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

TOPICS: 
Information Security Magazine

Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance
sponsored by Skybox Security
PRESENTATION TRANSCRIPT: PCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

TOPICS: 
Skybox Security

Presentation Transcript: ISACA PCI Compliance Symposium
sponsored by Intel
PRESENTATION TRANSCRIPT: Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.
Posted: 19 May 2011 | Published: 19 May 2011

TOPICS: 
Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement