Learn the major cost components of obtaining PCI DSS Compliance and how much organizations of different sizes should expect to pay; as well as three essential strategies for reducing (or eliminating) these expenses and how Very Good Security (VGS) can help organizations achieve all three simultaneously.
The PCI Security Standards Council on Thursday released the Payment Card Industry Data Security Standard version 4.0. The latest version's improvements are intended to counter evolving threats and technologies, and the new version will enable innovative methods to combat new threats.
Learn about the history of PCI DSS and what's expected with the release of PCI DSS 4.0, including:
Details on how PCI DSS has changed with each new iteration since 2004;
Information on the additional requirements of PCI 4.0 for designated entities;
Knowledge on the expected rise in adoption of the PCI...
Gain an understanding of what PCI compliance requires of organizations as well as the true cost of obtaining compliance, including:
What benefits your company will enjoy by investing in PCI compliance;
The cost of non-compliance, including data breach costs;
A breakdown of upfront and ongoing costs for each...
In this guide, we cover the importance of sensitive data and compliance for your organization when it comes to issuing payment cards. You will learn:
PCI compliance responsibilities for your card issuing business
Ways that you can retain full ownership over your data while gaining the most utility from it;...
Two states have recently taken steps to bolster cybersecurity and data privacy protections. Connecticut has enacted a law designed to give certain legal protections to businesses that adhere to cybersecurity frameworks. And a new data privacy law in Colorado allows individuals to opt out of data collection.
As new payment trends emerge, such as the surge in ecommerce during the COVID-19 pandemic, payment card standards also must change, says Jeremy King of the PCI Security Standards Council, who will be a featured speaker at ISMG's Virtual Cybersecurity and Fraud Summit: London on Oct. 20.
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
Jeff Schilling, global CISO at Teleperformance, a Paris-based company offering digitally integrated business services worldwide, describes four principles for mitigating security risks for the remote workforce during the COVID-19 pandemic.
Troy Leach of the PCI Security Standards Council discusses how the shift to card-not-present transactions during the COVID-19 pandemic has created new fraud-fighting challenges and offers an update on pending standards revisions.
Several sophisticated cybercriminals gangs are targeting "fuel dispenser merchants" throughout North America, in some cases by planting malware within corporate networks to steal payment card data, Visa warns in a new alert.
The latest edition of the ISMG Security Report offers an in-depth analysis of whether Instagram is doing enough to protect the contact information of minors. Plus: Compliance updates on GDPR and PCI DSS.
In December, PCI SSC plans to publish a new standard for solutions that enable "tap and go" transactions on merchant smartphones and other commercial off-the shelf mobile devices. Troy Leach, the council's CTO, offers insights on the role the standard will play in enhancing security for smaller merchants.
The latest edition of the ISMG Security Report offers an in-depth analysis of how to prevent data exposure in the cloud. Plus: why PCI's new contactless payment standard lacks PINs, and how to go beyond the hype to accurately define "zero trust."
Data breaches, incident response and complying with the burgeoning number of regulations that have an information security impact were among the top themes at this year's Infosecurity Europe conference in London. Here are 10 of the top takeaways from the conference's keynote sessions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.