MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Bank Technology News
July 2010
John Adams
Fifth Third Processing's Encryption is the Living End-to-End Fifth Third Processing Solutions is joining the encryption and tokenization fray, offering broad new personal data protections in a marketplace that's getting long on solutions while remaining short on standards and interoperability. mark for My Articles similar articles
Bank Technology News
November 2009
Rebecca Sausner
The End of the World Heartland Payment System's CEO predicts 2010 will be the year that the payments chain becomes significantly more secure. mark for My Articles similar articles
U.S. Banker
September 2007
Glen Fest
Card Security: Banks to Merchants: Toe the Line The PCI digital security standard is here, but retailers are struggling with compliance. Analysts say it'll take two years to build a totally secure environment to protect card data. mark for My Articles similar articles
Bank Systems & Technology
March 17, 2010
Penny Crosman
Fifth Third to Encrypt Card Payments End to End The bank is working with 180,000 merchants to secure card payments from merchant terminals to payment processor. mark for My Articles similar articles
Bank Systems & Technology
December 21, 2007
Maria Bruno-Britz
PCI Council and Visa See More PCI Compliance Merchants are complying with PCI Data Security Standards now more than ever. mark for My Articles similar articles
CIO
November 2, 2010
Robert McMillan
Tokenization: Five Things CIOs Need To Know Data breaches are expensive. One way to reduce the risk is to cut down on the places that handle sensitive data. Enter tokenization. mark for My Articles similar articles
U.S. Banker
March 2010
Karen Epper Hoffman
Mounting Pressure Banks and processors push merchants forward to meet card security deadline. mark for My Articles similar articles
Entrepreneur
February 2007
Melissa Campanelli
Pay It Safe Security standards might make you rethink your payment system. mark for My Articles similar articles
U.S. Banker
March 2009
Glen Fest
The Emperor's Old Clothes Still Don't Fit With the potential to be the new poster child for data breach notoriety, Heartland Payment Systems of New Jersey responded quickly to its massive security breach. mark for My Articles similar articles
Bank Technology News
March 2009
Rebecca Sausner
Heartland's Lonely Quest For Reform Heartland Payment Systems deals with perhaps the largest data breach ever. mark for My Articles similar articles
Bank Technology News
August 2010
John Adams
Friends When it Comes To the Breach Wars Christopher Kenyon, evp and CIO for the global payments processing subsidiary of U.S. Bancorp, recently discussed sharing of security info among processors and security interoperability. mark for My Articles similar articles
Bank Systems & Technology
June 22, 2010
Penny Crosman
PCI Council to Give Banks Extra Time to Adapt to Security Standards Moving its standards for securing payment card-related data, applications and terminals to a three-year lifecycle to give members more time to get used to them and offer feedback. mark for My Articles similar articles
Bank Technology News
March 2010
Bruce Rutherford
What's Ahead For PCI? As more businesses implement Payment Card Industry Data Security Standard as a necessary layer in protecting their customers' account data, increased vigilance will help result in fewer breaches, not to mention losses for businesses, financial institutions and cardholders. mark for My Articles similar articles
Bank Systems & Technology
August 24, 2010
Penny Crosman
Verizon Cloud PCI Compliant, Ready for Payment Apps Banks and other companies can potentially run payment applications in Verizon's data centers. mark for My Articles similar articles
Bank Systems & Technology
June 30, 2009
Nathan Conz
Heartland Completes First Phase of Encryption Pilot Heartland Payment Systems announces it has successfully completed an AES-encrypted transaction process from a merchant card reader through to a processor network. mark for My Articles similar articles
InternetNews
December 17, 2007
Andy Patrizio
Updating PCI Compliance Tools New version of QualysGuard breaks down the task of insuring safe transactions by department for step-by-step security testing. mark for My Articles similar articles
Bank Systems & Technology
August 3, 2009
Maria Bruno-Britz
Almost 600,000 Affected by Network Solutions Data Breach Web hosting company Network Solutions revealed Friday that unauthorized code was used to transfer the credit and debit card information from the e-commerce websites of 4,343 of its merchant clients to servers outside the company. mark for My Articles similar articles
U.S. Banker
September 2007
John Bingham
Data Breaches' Sophistication Prompt 'Digital Dozen' Standards Taking measures to prevent and deter data breaches is the best approach to avoiding the high cost of fraud. Collaborations among Visa, MasterCard, American Express, Discover Card and JCB created a common industry security requirement known as the Payment Card Industry Data Security Standard. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
InternetNews
September 19, 2008
Sean Michael Kerner
Does PCI Compliance Equal Security? The need for regulatory compliance is driving spending on security. Yet is it actually improving security overall? mark for My Articles similar articles
Bank Technology News
January 2011
11 Bank IT Trends for 2011 Regulatory changes and transaction escorts are among the banking trends for 2011. mark for My Articles similar articles
InternetNews
September 25, 2009
Companies Still Not Securing Customer Data New data security survey finds 71 percent admit that cost and lack of resources keeps them from making data security a top priority. mark for My Articles similar articles
InternetNews
November 17, 2010
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. mark for My Articles similar articles
InternetNews
April 19, 2011
Does PCI-DSS Matter? New report shows a correlation between PCI compliance and data breaches. mark for My Articles similar articles
InternetNews
October 19, 2009
Can Twitter Founder's iPhone Venture Take Off? Jack Dorsey's betting on a dongle for his next big hit. mark for My Articles similar articles
Bank Technology News
September 2009
Rebecca Sausner
1) Heartland Payment Systems Heartland Payment System's E3, an end-to-(almost) end encryption process, has the greatest potential of any new product to impact the security of America's financial system in the coming year. mark for My Articles similar articles
InternetNews
November 1, 2010
What the PCI-DSS 2.0 Security Standard Means What's new and what's still missing is the latest update to the security standard for payment and merchant systems? mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
InternetNews
November 16, 2007
Sean Gallagher
Security Sweep Finds Retailer's Wi-Fi Networks At Risk A majority of the wireless network devices found at retailers are ripe for potential compromise, a recent survey by a wireless security firm has found. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
CIO
May 13, 2010
David Carr
PCI Compliance: Five Things You Need to Know The Payment Card Industry Data Security Standards are the floor, not the ceiling for data secruity. Good organizations go beyond cramming for annual PCI reviews. mark for My Articles similar articles
InternetNews
May 8, 2009
Alex Goldman
Heartland Hit With $12M Breach Tab The credit card payment processor is disputing fines from MasterCard and Visa, but the security breach turned what would have been a profitable quarter into a loss. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
JavaWorld
August 2002
Ray Djajadinata
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. mark for My Articles similar articles
Bank Systems & Technology
June 29, 2009
Maria Bruno-Britz
Bank of America, First Data to Form 'Next-Gen' Payments Company Banc of America Merchant Services is being created to deliver merchants and consumers with a variety of secure, convenient payment features. mark for My Articles similar articles
Entrepreneur
November 2004
Amanda C. Kooser
The I's Have It A more secure wireless standard is on its way and major manufacturers are expected to implement the new standard with a focus on business hardware first. mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. mark for My Articles similar articles
InternetNews
April 17, 2009
Alex Goldman
Report: Credit Cards Plentiful in Crime Networks There are so many credit cards in criminal markets that their price has dropped, leading to a new target: PIN numbers. mark for My Articles similar articles
InternetNews
July 20, 2009
Use Risk Management to Make Security Proactive Changing the IT culture can deliver benefits such as business/IT alignment, but it's not easy - it must be lead from the top. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
InternetNews
April 2, 2007
Andy Patrizio
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. mark for My Articles similar articles
Bank Systems & Technology
June 1, 2004
George V. Hulme
Ingrian Networks Helps Union Bank Protect Customer Data Better Vendor's DataSecure platform boosts bank's encryption capabilities and improves key management. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
InternetNews
September 12, 2006
Sean Michael Kerner
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. mark for My Articles similar articles