Emerging payments technologies, such as tokenization, are already being deployed in the marketplace, but standardization, as it relates to the security of some of these emerging solutions, is lacking.
This week's top news and views: The arrest of 53 suspects charged with a sophisticated identity theft and fraud scheme gets the attention of federal agents, and the message from the PCI Security Standards Council's annual North American Community Meeting: "Stolen Credit Card Information Is a Commodity That Has Worth."
Topics such as encryption and chip and PIN are expected to play significant roles in discussions at this week's Payment Card Industry Security Standard Council Community Meeting in Orlando, Fla.
As of March 1, 2010, all organizations with operations and/or customers in the state of Massachusetts will be required to follow comprehensive information security requirements regarding both paper and electronic records containing personal information.
These requirements include enforcing password security,...
Tokenization or end to end encryption - which solution will win the hearts of data protectors in the race to secure data?
A recent study conducted by PriceWaterhouseCoopers on behalf of the Payment Card Industry Security Standards Council shows that end to end encryption and tokenization are the top choices for...
Visa has announced new global best practices for data field encryption, also known as end-to-end encryption - a much-discussed solution in the wake of the Heartland Payment Systems breach.
Emerging technologies are the hottest topics of discussion within the PCI Security Standards Council community meeting in Las Vegas this week.
The question, says David Taylor, founder of the PCI Knowledge Base, a PCI research firm, is 'How will PCI's security standards council embrace end-to-end encryption,...
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than...
Protecting sensitive and business-critical data is essential to a company's reputation, profitability and business objectives. Companies know they can't afford a data breach - customer churn, loss of business, brand damage, fines and litigation.
In today's global market, where business data and personal information...
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than...
Whether you are working towards your first or next PCI DSS audit, you know that compliance isn't scored as a one or a zero - it's measured on a sliding scale. You've successfully argued for adoption of various security technologies to protect cardholder data, including encryption and firewalls, and have come to...
In the first step of its move toward end-to-end encryption, Heartland Payment Systems (HPY) last week completed the first phase of its pilot project.
Heartland, the sixth biggest payments processor, earlier this year announced that it was hit with a data breach, wherein credit card numbers and debit card...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.