Email Alerts
-
PCI Council issues point-to-point encryption validation requirements
A new validation program will certify point-to-point encryption systems that use devices for encryption and decryption as well as hardware security modules. News
-
Cloud computing providers and PCI virtualization requirements
How should an enterprise approach its cloud computing providers following the debut of the PCI virtualization requirements? Charles Denyer explains. Answer
-
Can the VMware PCI Compliance Checker assess my compliance posture?
The VMware PCI Compliance Checker claims to assess the compliance of a VMware virtual environment. Does it work? Charles Denyer has the answer. Answer
-
PCI Requirement 12.8.2: When is client compliance necessary?
Expert Charles Denyer addresses whether the PCI 12.8.2 requirement forces an organization working with a payment card merchant to become compliant. Answer
-
Cloud computing PCI compliance: Is it possible?
Is enterprise cloud computing PCI compliance possible? Expert Charles Denyer discusses how to use cloud computing and be PCI DSS-compliant. Answer
-
PCI tokenization: Vendors need to iron out differences, expert says
The long-awaited PCI Tokenization Guidelines add heft to its use, but persisting problems deter merchants from fully embracing the technology, according to one expert. News
-
PCI Council issues long-awaited PCI tokenization compliance guidance
PCI DSS tokenization can reduce the scope of a PCI assessment, according to new guidance issued Friday. One expert says it’s been a long time coming. News
-
PCI tokenization: Credit card security policy guidance
Experts Diana Kelley and Ed Moyle discuss the PCI guidelines on tokenization, and how the technology could aid your enterprise. Video
-
PCI encryption, virtualization standards: Interpreting PCI guidelines
Get expert advice on understanding the PCI encryption requirements and virtualization guidance in this video. Video
-
PCI virtualization SIG analysis: Guidance for the cardholder data environment
The PCI virtualization SIG guidance is in. Get analysis and advice on virtualization in the cardholder data environment from expert Diana Kelley. Tip
Security Management Strategies for the CIO