PCI - News, Features, and Slideshows
The Payment Card Industry (PCI) Security Standards Council today issued guidelines on how businesses storing, processing or transmitting payment-card information should look at doing an annual risk assessment.
By Ellen Messmer | 16 November, 2012 19:57
Online retailers should use a PCI-compliance payment gateway for credit card transactions, or become compliant themselves, to avoid Lush-style data breaches, says the man at Westpac tasked with securing as many as 20 million credit card accounts.
By Rodney Gedda | 17 February, 2011 12:03
A survey of 500 information technology professionals with responsibility to assure compliance with the Payment Card Industry (PCI) security standard shows just over half find it "burdensome but necessary" in their organizations and about a third see it impacting their virtualized network environments in particular in the future.
By Ellen Messmer | 13 January, 2011 02:12
X86 virtualization is often a risky proposition for highly regulated, mission-critical applications, because people and processes are not ready for virtualization and the security risks it introduces, IBM security expert Joshua Corman argued at Interop Las Vegas this week.
By Jon Brodkin | 27 May, 2009 07:43
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Constant connectivity is causing a shift in worker expectations. This whitepaper demonstrates how an effective mobility strategy empowers users and improves business performance without compromising essential IT controls. • Employees and business leaders expect constant connectivity, diverse collaboration tools and on-demand access to enterprise applications • If user expectations don’t align with business requirements, decision makers must find a common ground • By adopting a comprehensive, integrated solution, organizations can quickly and flexibly add new capabilities
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy