Research Library

Powered by

Payment Card Industry Research

  • Why PCI DSS Compliance is Impossible without Privileged Management

    Sponsored by: One Identity

    For many organizations, compliance with data security standards is very difficult. This white paper dives into IT security compliance for PCI DSS and offers strategies to make your compliance approach tangible and secure.

  • Achieve Effective PCI Compliance by Automating Required Controls and Processes

    Sponsored by: Skybox Security

    Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.

  • Mobile Payments: More Than Just a New Way to Pay

    Sponsored by: Applause

    Download this white paper to uncover how your organization can address mobile payment challenges, with a three-pronged approach to in-store, online, and omnichannel Payment Strategy and Validation.

  • 4 Challenges Building Digital Payments is Creating and How to Address Them

    Sponsored by: Applause

    This white paper explores how to build and test payment apps that are reliable and deliver a quality user experience. Learn about crowdtesting and how it can help you overcome 4 key challenges associated with building digital payment apps across web and mobile.

  • PCI DSS Endpoint Security

    Sponsored by: enSilo

    Take a look at this white paper to learn more about the PCI DSS compliance regulation and how to secure your endpoints to comply with the policy.

  • PCI DSS & Your Call Center: The Do's & Don'ts of Compliance

    Sponsored by: Semafone

    According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.

  • The Perils & Pitfalls of Pause & Resume Call Recording

    Sponsored by: Semafone

    The average cost of a data breach has risen to $4 million, according to the Cost of a Data Breach Study: Global Analysis. Explore this webinar to gain insight into security within the payment card industry and uncover PCI DSS compliance regulation information.

  • Improving Cybersecurity in the Contact Center: How to Prevent a Data Breach

    Sponsored by: Semafone

    According to the Semafone's State of Data Security in Contact Centers Report, more than 40% of agents do not report data breach attempts. Take an in-depth look at this webinar to gain a better understanding of the payment card industry and how to advance your security to prevent data breaches from occurring.

  • The State of Data Security in Contact Centers

    Sponsored by: Semafone

    A concerning number of contact centers continue to rely on outdated, risky practices for customer interaction, data collection and fraud prevention, which can lead to damaging data breaches. This resource offers a deeper understanding into avoiding contact center security risks when collecting customer data.

  • PCI DSS Compliance: Best Practice Checklist

    Sponsored by: Semafone

    With a multitude of systems, people, and processes within the call center, securing sensitive customer data has become increasingly challenging, and this is why the PCI DSS regulation was implemented. Explore this resource to uncover a PCI DSS checklist to gauge your compliance readiness.

  • DTMF Masking for PCI DSS Compliance

    Sponsored by: Semafone

    PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.

  • Inside Online Carding Courses Designed for Cybercriminals

    Sponsored by: Digital Shadows

    Experts project a loss of $24 billion to payment card fraud by the end of 2018. This paper looks at an online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and protect themselves from becoming the next fraud victim.

  • Cb Defense: PCI DSS Anti-Virus Assessment

    Sponsored by: Carbon Black

    This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.

  • Addressing PCI Compliance

    Sponsored by: CA Technologies.

    Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.

  • Internet Trust Marks: Building Confidence and Profit Online

    Sponsored by: Symantec Website Security Solutions

    This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

  • Voltage Success Story: Envision Pharmaceutical Services

    Sponsored by: Voltage Security, Inc.

    This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.

  • Payment Behaviour in Australia: May 2014 Findings

    Sponsored by: Hewlett Packard Enterprise

    Learn where future investment in payment technologies will be required, and get insight into the state of consumer payments in Australia, with findings on payment method trends and changes in consumer spending behaviour. Learn about consumer attitudes toward payment methods, and the likely effect on the future of the payments system. And much more!

  • Simplify implementation of the HITRUST Common Security Framework

    Sponsored by: Symantec Corporation

    Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.

  • Compliance Field Guide: Reducing Costs in an Increasingly Regulated World

    Sponsored by: Symantec Corporation

    This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.

  • 5 Ways Hosting Providers Prepare Clients for PCI 3.0

    Sponsored by: INetU Inc.

    This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.

  • ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage

    Sponsored by: ThreatMetrix

    This case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.

  • Leverage Security Intelligence for Retail

    Sponsored by: IBM

    This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.

  • PCI DSS compliance 101

    Sponsored by: DellEMC and Intel®

    This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.

  • PCI 101: A Beginner’s Guide to PCI DSS Compliance

    Sponsored by: FireHost Inc.

    This webcast covers everything you need to know about the payment card industry data security standard.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.