PCI encryption, virtualization standards: Interpreting PCI guidelines

PCI encryption, virtualization standards: Interpreting PCI guidelines

PCI encryption, virtualization standards: Interpreting PCI guidelines

Date: Jul 13, 2011

Experts Diana Kelley and Ed Moyle discuss the PCI encryption requirements and PCI guidelines for virtualization standards in this video.

Topics include:

  • How do the PCI guidance documents actually work, and have they been helpful?
  • PCI council guidance on mobile payment
  • End-to-end encryption and its overlap with tokenization
  • The use of virtualization and virtual payment systems in cardholder environments
  • What it means when a service provider is PCI compliant

Watch the first part of this interview: PCI tokenization: Credit card security policy guidance.

More on PCI Data Security Standard

  • canderson

    Why infosec will increasingly rely on computer hardware security

    VIDEO - Video: Cryptography luminary Paul Kocher discusses why computer hardware security will play a larger role in the information security product ecosystem.
  • canderson

    PCI 3.0 changes: A PCI compliance requirements checklist for 2015

    VIDEO - In this presentation, compliance expert Nancy Rodriguez offers a line-by-line review of the key PCI DSS changes that become mandatory as of Jan. 1, 2015.
  • canderson

    Gartner on PCI DSS 3.0 changes: Bigger, harder and more expensive

    VIDEO - Gartner analyst Avivah Litan discusses how Gartner clients are reacting to the changes in PCI DSS 3.0, and whether the increased rigor in the standard will prove beneficial to enterprises.
  • RFC 1918

    Definition - RFC 1918 specifies ranges of IP addresses for use in private networks. These private IP addresses cannot be routed on the Internet.
  • PCI DSS 3.1 set for April 2015 release, will cover SSL vulnerabilities

    News - The PCI Security Standards Council has confirmed that PCI DSS 3.1 will be released in just a few weeks. According to a Gartner analyst, the surprise new release could cause major problems for merchants.

    ( Mar 30, 2015 )

  • National Vulnerability Database (NVD)

    Definition - NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.S. Government for security management and compliance as well as automatic vulnerability management.
  • virtual payment terminal

    Definition - Virtual terminals allow sellers to take credit card payments online for orders made online or over the phone without requiring a card reader device.
  • ingress filtering

    Definition - Ingress filtering is a method of verifying that inbound packets originate from the source computer they claim to be from before entry (or ingress) is granted.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: