Tokenization or end to end encryption - which solution will win the hearts of data protectors in the race to secure data?
A recent study conducted by PriceWaterhouseCoopers on behalf of the Payment Card Industry Security Standards Council shows that end to end encryption and tokenization are the top choices for...
Visa has announced new global best practices for data field encryption, also known as end-to-end encryption - a much-discussed solution in the wake of the Heartland Payment Systems breach.
Emerging technologies are the hottest topics of discussion within the PCI Security Standards Council community meeting in Las Vegas this week.
The question, says David Taylor, founder of the PCI Knowledge Base, a PCI research firm, is 'How will PCI's security standards council embrace end-to-end encryption,...
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than...
Protecting sensitive and business-critical data is essential to a company's reputation, profitability and business objectives. Companies know they can't afford a data breach - customer churn, loss of business, brand damage, fines and litigation.
In today's global market, where business data and personal information...
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than...
Whether you are working towards your first or next PCI DSS audit, you know that compliance isn't scored as a one or a zero - it's measured on a sliding scale. You've successfully argued for adoption of various security technologies to protect cardholder data, including encryption and firewalls, and have come to...
In the first step of its move toward end-to-end encryption, Heartland Payment Systems (HPY) last week completed the first phase of its pilot project.
Heartland, the sixth biggest payments processor, earlier this year announced that it was hit with a data breach, wherein credit card numbers and debit card...
In this white paper, Jon Oltsik, Principal Analyst at ESG, cuts through the hype and provides recommendations to protect your organization's data, with today's budget. Oltsik shows you where to start, how to focus on the real threats to data, and what actions you can take today to make a meaningful contribution to...
For thousands of years, people have attempted to hide sensitive information from competitors or enemies.
Since January, critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for...
For thousands of years, people have attempted to hide sensitive information from competitors or enemies.
Since January, critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for...
A new whitepaper on remote management for Thales HSM 8000 users
With data center consolidation, it is increasingly common for management of the data center to be at some other remote location. Flying HSM administrators to HSM locations to perform vital security functions which require their physical presence is...
Does your organization use real customer profiles and statistics to drive marketing efforts or real employee data for salary/benefit analysis? Is your organization conducting one of these or other critical business activities that require data analysis? While these activities are critical to organizational success,...
In the current economic and cultural environment, the financial services industry is being particularly scrutinized with regards to legal and regulatory compliance.
Learn more about the legal and regulatory compliance requirements targeting the Finance industry.
Download this white paper to:
Learn about...
In the wake of the Heartland Payment Systems (HPY) data breach, credit card company Visa is on the road talking to its network of payment processors about current security threats and the merits of the Payment Card Industry Data Security Standard (PCI DSS).
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.