Email Alerts
-
Web application security testing: Is a pen test or code review better?
For Web application security testing, if cash is tight, should a penetration test top an application code review? Michael Cobb explains his choice. Answer
-
PCI DSS compliance: What to do when agents email credit card numbers
Emailing unencrypted credit card numbers is a violation of PCI DSS. Learn how to stop customer service agents from practicing this dangerous act. Answer
-
How to address PCI compliance in the cloud
Expert Mike Chapple offers advice on how to address PCI compliance when moving systems to the public cloud. Answer
-
Criteria for evaluating PCI consultants
PCI consultants can help organizations achieve PCI DSS compliance, but first you must choose the right one. Answer
-
Unencrypted credit card data storage: Why 70% of merchants do it
Mike Chapple offers four possible reasons why some merchants still store unencrypted credit card data after years of PCI DSS compliance requirements. Answer
-
Breaking down PCI SSC's Qualified Integrators and Resellers program
Mike Chapple breaks down PCI SSC's new Qualified Integrators and Resellers (QIR) program, explaining the compliances requirements for merchants. Answer
-
Complying with MasterCard's new PCI Level 2 assessment requirements
Expert Mike Chapple breaks down how Level 2 merchants can comply with MasterCard's new requirement for PCI self-assessments. Answer
-
Four compliance IT management tips to improve employee engagement
Mike Chapple offers four tips for improving employee collaboration and creativity with an enterprise's compliance program. Answer
-
Mobile payment networks: What are the PCI compliance requirements?
Mike Chapple discusses what the PCI compliance requirements might look like for mobile payment networks such as Merchant Customer Exchange (MCX). Answer
-
How to reduce PCI scope with credit card tokenization
It's possible to reduce PCI scope with credit card tokenization if it is implemented properly. Expert Mike Chapple explains in this Q&A. Answer
Security Management Strategies for the CIO