Vertical Industries  >   Financial Services Industry  >  

Payment Card Industry

RSS Feed   
ALSO CALLED: Card Payment Industry, Credit Card Industry, PCI
DEFINITION: PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers. PAN truncation is used by point-of-sale (POS) terminals and has become nearly universal in recent years. In many jurisdictions, PAN truncation is mandated by the government. The intent is to prevent fraud  … 

Payment Card Industry definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Payment Card Industry Reports
1 - 25 of 74 Matches Previous Page  |  Next Page
LexisNexis Risk Solutions 2019 True Cost of Fraud Study E-commerce/Retail Report
sponsored by LexisNexis Risk Solutions
WHITE PAPER: This research provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants (retail and online/mobile) should be aware of as they add new payment mechanisms and expand channels into online, mobile, and international sectors.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

LexisNexis Risk Solutions

True Cost of Fraud Webinar
sponsored by LexisNexis Risk Solutions
WEBCAST: The LexisNexis Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.
Posted: 23 Oct 2019 | Premiered: Oct 23, 2019

LexisNexis Risk Solutions

One Fish, Two Fish, Three Fish, Fraud Fish
sponsored by Splunk
RESOURCE: In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Splunk

6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments
sponsored by Alert Logic
EBOOK: This e-book examines the challenges inherent in achieving continuous PCI DSS compliance across multi-cloud and hybrid landscapes and what to look for in evaluating solutions and service providers that can address those complexities.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Alert Logic

Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

The Threat of Online Skimming to Payment Security
sponsored by Tala Security
RESOURCE: The emerging threat of online skimming presents a great threat to the payment security industry. In this blog, explore basic questions with PCI SSC Chief Technology Officer Troy Leach about a newly released bulletin by the PCI SSC on the topic of digital skimming and how to detect and prevent this dangerous threat.
Posted: 09 Aug 2019 | Published: 01 Aug 2019

Tala Security

Magecart PCI Advisory on CSP
sponsored by Tala Security
RESOURCE: The Payment Card Industry Security Standard Council issued a set of recommendations and guidance to address the growing threat by magecart. They suggested using Content Security Policies (CSP) to restrict compliant browsers from executing JavaScript from source which have not been explicitly whitelisted. In this blog, learn more about CSP.
Posted: 06 Aug 2019 | Published: 02 Aug 2019

Tala Security

Cloud Visibility Report
sponsored by FairWarning
RESEARCH CONTENT: As businesses leverage cloud computing as a central point of business, they have begun looking for security-centric ways to monitor how users are interacting with cloud applications. In this Cloud Visibility Report, learn how other organizations are proactively monitoring their cloud application to gain critical insights into application usage.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

FairWarning

Meet PCI DSS Requirements
sponsored by HackerOne
WEBCAST: Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Astute Solutions: Minimizing PCI Scope While Securing Stored Sensitive Data
sponsored by Armor
CASE STUDY: Astute is a consumer-engagement software company. In the past, Astute's customers didn't need to store cardholder data. But as the demand for instant payments increased, it became clear that it was no longer avoidable. In this case study, learn why Astute decided to implement Armor's TokenEx platform to help protect sensitive data.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Armor

Global Payments Technology Company Achieves PCI Compliance
sponsored by Comforte AG
CASE STUDY: An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Comforte AG

The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by Comforte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Comforte AG

Thailand's Government Savings Bank
sponsored by Comforte AG
CASE STUDY: Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Leading Canadian Bank Achieves Compliance for Themselves and their Customers
sponsored by Comforte AG
CASE STUDY: To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017

Trend Micro, Inc.

Cyberthreats and Risks in the Payment Card Industry
sponsored by Jumio
EGUIDE: Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Payment Behaviour in Australia: May 2014 Findings
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: Learn where future investment in payment technologies will be required, and get insight into the state of consumer payments in Australia, with findings on payment method trends and changes in consumer spending behaviour. Learn about consumer attitudes toward payment methods, and the likely effect on the future of the payments system. And much more!
Posted: 22 May 2014 | Published: 01 May 2014

Hewlett Packard Enterprise

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage
sponsored by ThreatMetrix
WHITE PAPER: This case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

DellEMC and Intel®

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

The Payment Island Deconstructed
sponsored by FireHost Inc.
WEBCAST: This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.
1 - 25 of 74 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement