ComputerWeekly.com Research Library

Powered by Bitpipe.com

Payment Card Industry Data Security Standard Research

  • PCI Deep Dive Webinar: Software Security Framework to Replace PA-DSS

    Sponsored by: Snyk

    Developing secure payment software can be tricky, especially when dealing with third-party components. PCI secure software frameworks offer clear procedures, tools, and recommendations for compliancy. In this webinar, four experts dive into how to ensure PCI compliance and protect your organization from vulnerabilities. Watch the webinar now.

  • The Missing Link in Website Security

    Sponsored by: Tala Security

    Traditional back-end website security technologies are ineffective at maintaining security in today’s threat landscape – especially considering the additional pressures of regulatory requirements. In this white paper, take a look at the key gaps in the website security environment and explore ways to rethink current tactics.

  • Achieving Compliance and Reducing Risk

    Sponsored by: Comforte AG

    Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.

  • 3 Ways to Reduce PCI DSSv3.2 Audit Scope

    Sponsored by: Comforte AG

    Discover a quick reference guide summarizing PCI requirements and common technologies deployed to meet the requirements

  • One Fish, Two Fish, Three Fish, Fraud Fish

    Sponsored by: Splunk

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.

  • 6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments

    Sponsored by: Alert Logic

    This e-book examines the challenges inherent in achieving continuous PCI DSS compliance across multi-cloud and hybrid landscapes and what to look for in evaluating solutions and service providers that can address those complexities.

  • Protecting Point-of-Sale Systems

    Sponsored by: Morphisec, Inc.

    With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.

  • The Threat of Online Skimming to Payment Security

    Sponsored by: Tala Security

    The emerging threat of online skimming presents a great threat to the payment security industry. In this blog, explore basic questions with PCI SSC Chief Technology Officer Troy Leach about a newly released bulletin by the PCI SSC on the topic of digital skimming and how to detect and prevent this dangerous threat.

  • Cloud Visibility Report

    Sponsored by: FairWarning

    As businesses leverage cloud computing as a central point of business, they have begun looking for security-centric ways to monitor how users are interacting with cloud applications. In this Cloud Visibility Report, learn how other organizations are proactively monitoring their cloud application to gain critical insights into application usage.

  • Meet PCI DSS Requirements

    Sponsored by: HackerOne

    Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.

  • One Fish, Two Fish, Three Fish, Fraud Fish

    Sponsored by: Splunk

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.

  • Global Payments Technology Company Achieves PCI Compliance

    Sponsored by: Comforte AG

    An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.

  • The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance

    Sponsored by: Comforte AG

    In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.

  • Thailand's Government Savings Bank

    Sponsored by: Comforte AG

    Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.

  • Leading Canadian Bank Achieves Compliance for Themselves and their Customers

    Sponsored by: Comforte AG

    To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.

  • Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance

    Sponsored by: Trend Micro, Inc.

    This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Voltage Success Story: Envision Pharmaceutical Services

    Sponsored by: Voltage Security, Inc.

    This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.

  • Simplify implementation of the HITRUST Common Security Framework

    Sponsored by: Symantec Corporation

    Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.

  • 5 Ways Hosting Providers Prepare Clients for PCI 3.0

    Sponsored by: INetU Inc.

    This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.

  • Leverage Security Intelligence for Retail

    Sponsored by: IBM

    This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.

  • PCI DSS compliance 101

    Sponsored by: DellEMC and Intel®

    This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.

  • PCI 101: A Beginner’s Guide to PCI DSS Compliance

    Sponsored by: FireHost Inc.

    This webcast covers everything you need to know about the payment card industry data security standard.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: SearchSecurity.com

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.