Email Alerts
-
PCI e-commerce compliance guidelines for third-party payment processors
Expert Mike Chapple details the PCI SSC's third-party processor rules and how to outsource card processing and stay PCI DSS compliant. Tip
-
HIPAA Omnibus Rule, PPACA challenge enterprise compliance management
Compliance practitioners say new mandates like the HIPAA Omnibus Rule and Obamacare are making enterprise compliance management even harder. News
-
Web application security testing: Is a pen test or code review better?
For Web application security testing, if cash is tight, should a penetration test top an application code review? Michael Cobb explains his choice. Answer
-
PCI DSS compliance: What to do when agents email credit card numbers
Emailing unencrypted credit card numbers is a violation of PCI DSS. Learn how to stop customer service agents from practicing this dangerous act. Answer
-
How to address PCI compliance in the cloud
Expert Mike Chapple offers advice on how to address PCI compliance when moving systems to the public cloud. Answer
-
Criteria for evaluating PCI consultants
PCI consultants can help organizations achieve PCI DSS compliance, but first you must choose the right one. Answer
-
Unencrypted credit card data storage: Why 70% of merchants do it
Mike Chapple offers four possible reasons why some merchants still store unencrypted credit card data after years of PCI DSS compliance requirements. Answer
-
Breaking down PCI SSC's Qualified Integrators and Resellers program
Mike Chapple breaks down PCI SSC's new Qualified Integrators and Resellers (QIR) program, explaining the compliances requirements for merchants. Answer
-
Understanding PCI mobile payment processing security guidelines
Mike Chapple discusses the new PCI Mobile Payment Acceptance Security Guidelines and the mobile payment processing implications for merchants. Tip
-
B-Sides: Akamai's Corman calls for new information security focus
At Security B-Sides 2013, Joshua Corman railed against PCI DSS and vendor profit measures, calling for a renewed information security focus on what really matters. News
Security Management Strategies for the CIO