This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
PCI - News, Features, and Slideshows
The Payment Card Industry (PCI) Security Standards Council today issued guidelines on how businesses storing, processing or transmitting payment-card information should look at doing an annual risk assessment.
Online retailers should use a PCI-compliance payment gateway for credit card transactions, or become compliant themselves, to avoid Lush-style data breaches, says the man at Westpac tasked with securing as many as 20 million credit card accounts.
A survey of 500 information technology professionals with responsibility to assure compliance with the Payment Card Industry (PCI) security standard shows just over half find it "burdensome but necessary" in their organizations and about a third see it impacting their virtualized network environments in particular in the future.
X86 virtualization is often a risky proposition for highly regulated, mission-critical applications, because people and processes are not ready for virtualization and the security risks it introduces, IBM security expert Joshua Corman argued at Interop Las Vegas this week.
- Ransomware explosion is the latest security wakeup call for CxOs
- The Future is Encrypted. Manage It.
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Hear from International Tom Corn on the future of security virtualisation | 28th July 2016 Victoria
- Join ME Bank, Deutsche Bank and Proofpoint (USA) speakers for a discussion on banking trojans. Register now
- New Destination Gigamon Security Resources IS HERE
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Caution: That SSL Blind Spot is Growing
- As networks evolve, visibility remains key to managing IT-security risk in business terms