Payment Card Industry Data Security Standard Research
-
Basic Building Blocks: Preparing for PCI DSS 2.0
Sponsored by: Veracode, Inc.With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
-
Your September Issue of Information Security Magazine– Readers’ Choice Awards
Sponsored by: Information Security MagazineIn this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
-
Knowledge is Power
Sponsored by: IBMYour software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
-
Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
Sponsored by: Tripwire, Inc.Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
-
Identity Finder Enterprise Suite 4.5
Sponsored by: Identity Finder, LLCIdentity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
-
Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
Sponsored by: Information Security MagazineThe industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
-
E-Guide: Information Security Essential Guide to Compliance
Sponsored by: Information Security MagazineCompliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
-
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
Sponsored by: TechTarget SecurityRead this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
-
PCI Compliant Yesterday. Still Compliant Today?
Sponsored by: Tripwire, Inc.This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.
-
Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops
Sponsored by: Red Hat and JBossThe PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.
-
Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance
Sponsored by: Skybox SecurityPCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues.
-
Escaping PCI purgatory
Sponsored by: IBMIBM offers comprehensive solutions designed to take businesses through the entire PCI compliance process and continue to meet new requirements, supporting the next level of security. Read the white paper ‘Escaping PCI Purgatory’ to learn more.
-
Essential Guide to PCI DSS
Sponsored by: Information Security MagazineThis E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
-
The Best PCI Audit of Your Life
Sponsored by: LumensionThis white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
-
PCI Compliance Made Simple
Sponsored by: Alert LogicMajor data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
-
Profiting from PCI Compliance
Sponsored by: IBMThis paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
-
Symantec IT Compliance Solution
Sponsored by: Symantec CorporationSymantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.
-
Laws, regulations and compliance: Top tips for keeping your data under your control
Sponsored by: SophosThis paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
-
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
Sponsored by: TechTarget ComputerWeekly.comCheck out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
-
eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
Sponsored by: TechTarget SecurityCheck out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
-
PCI DSS Success: Archiving Compliance and Increasing Web Application Security
Sponsored by: CitrixThis paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
Cisco PCI Compliance Services
Sponsored by: Cisco Systems, Inc.Cisco PCI Compliance Services assist companies in achieving and maintaining PCI compliance. Read about vulnerability and gap assessments, remediation work to achieve compliance, and continuous monitoring to maintain PCI compliance.
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
-
Meeting the Payment Card Industry Data Security Standard
Sponsored by: Prism Microsystems Inc.Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues.