Email Alerts
-
How to reduce PCI scope with credit card tokenization
It's possible to reduce PCI scope with credit card tokenization if it is implemented properly. Expert Mike Chapple explains in this Q&A. Answer
-
How an assessor validates the PCI DSS scope of compliance
Expert Mike Chapple explains the four tests a QSA performs to validate that an organization has properly defined their PCI DSS scope of compliance. Answer
-
How to determine if you're using a PCI-compliant cloud provider
Small business credit card processing from a PCI-compliant cloud provider can help reduce the burden of PCI compliance. Expert Mike Chapple explains. Answer
-
Implement software development security best practices to support WAFs
WAFs aren't a panacea for all Web security woes. Software development security best practices are still vital. Expert Michael Cobb discusses why. Answer
-
Submitting a report on compliance from an old PCI assessment provider
Can companies submit a report on compliance to a new credit card transaction processor via a PCI assessment provider? Mike Chapple discusses. Answer
-
Company-wide compliance: How to choose a PCI awareness training program
Expert Mike Chapple offers options for companies seeking a PCI awareness training program for employees. Answer
-
How to secure C-level support for ongoing PCI compliance
Expert Mike Chapple offers advice on how security professionals can obtain C-level support for ongoing PCI compliance. Answer
-
Security vs. compliance: Moving beyond a 'checkbox security' mentality
Mike Chapple discusses the compliance vs. security challenge and why a "checkbox security" mentality may actually be a good thing. Answer
-
PCI compliance in the cloud: Can cloud service providers manage PCI?
PCI compliance in the cloud is controversial, so can a company really trust cloud service providers to manage their PCI DSS compliance? Answer
-
Password compliance and password management for PCI DSS
Can poor password management lead to PCI DSS non-compliance? Mike Chapple outlines key password compliance best practices. Answer
Security Management Strategies for the CIO