ComputerWeekly.com Research Library

Powered by Bitpipe.com

Credit Cards Research

  • How do cybercriminals steal credit card information?

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

  • PCI Council issues mobile application rules for software developers

    Sponsored by: TechTarget Security

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • E-Guide: PCI DSS 2011: Key themes to watch

    Sponsored by: TechTarget Security

    This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.

  • INDISPENSABLE CHANNEL ANALYSIS

    Sponsored by: MicroScope

    April ezine: Rebalancing margins. It's time for vendors to reconsider reward models to reflect the changes in the ways partners generate their revenues

  • Who's in Your Wallet? Stemming Credit Card Fraud

    Sponsored by: TechTarget Security

    Access this technical guide and learn about the standards the payment card industry uses to mitigate the problem including the costs of such standards to your business. Find out the latest info on credit card fraud, industry guidance and how to optimize your system for legitimate customers.

  • Payment Behaviour in Australia: May 2014 Findings

    Sponsored by: Hewlett Packard Enterprise

    Learn where future investment in payment technologies will be required, and get insight into the state of consumer payments in Australia, with findings on payment method trends and changes in consumer spending behaviour. Learn about consumer attitudes toward payment methods, and the likely effect on the future of the payments system. And much more!

  • How to keep your confidential information safe

    Sponsored by: Informatica

    Access this concise resource to uncover the key features of a data masking tool, to ensure the security of your organization's reputation and confidential information.

  • PCI 101: A Beginner’s Guide to PCI DSS Compliance

    Sponsored by: FireHost Inc.

    This webcast covers everything you need to know about the payment card industry data security standard.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: TechTarget Security

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • Rules, risk and the potential for profit in the world of Basel III

    Sponsored by: IBM

    Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III

  • Toward Active Management of Counterparty Credit Risk with CVA

    Sponsored by: IBM

    To support this new and rapidly developing trading function, organizations must invest in flexible systems that can adapt to incorporate CCR best practices.

  • CARA Meets PCI Requirements and Gains Network Visibility: A Case Study

    Sponsored by: LogRhythm, Inc.

    This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!

  • SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes

    Sponsored by: IBM

    This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.

  • Reducing PCI DSS Scope with the First Data® TransArmor® Solution

    Sponsored by: First Data Corporation

    Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.

  • Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization

    Sponsored by: Intel

    Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.

  • Achieving PCI compliance with Dell SecureWorks' security services

    Sponsored by: DellEMC and Intel®

    It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.

  • Log Management Best Practices: Six Tips for Success

    Sponsored by: Novell, Inc.

    The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.

  • SonicWALL PCI Compliance Solution Brief

    Sponsored by: SonicWALL

    The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    Sponsored by: Veracode, Inc.

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  • Data Loss Prevention for IBM i

    Sponsored by: Innovatum, Inc.

    Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.

  • Five Challenges to Continuous PCI DSS Compliance

    Sponsored by: Tripwire, Inc.

    As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.

  • Data Breach Case Study: Heartland Payment Systems

    Sponsored by: Sourcefire

    Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.

  • Cisco PCI Compliance Services

    Sponsored by: Cisco Systems, Inc.

    Cisco PCI Compliance Services assist companies in achieving and maintaining PCI compliance. Read about vulnerability and gap assessments, remediation work to achieve compliance, and continuous monitoring to maintain PCI compliance.

  • Protecting Credit Card Data: How to Achieve PCI Compliance

    Sponsored by: Motorola Solutions

    This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.

  • Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications

    Sponsored by: Paymetric, Inc.

    Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.