Similar Articles |
|
Bank Technology News July 2010 John Adams |
Fifth Third Processing's Encryption is the Living End-to-End Fifth Third Processing Solutions is joining the encryption and tokenization fray, offering broad new personal data protections in a marketplace that's getting long on solutions while remaining short on standards and interoperability. |
Bank Technology News November 2009 Rebecca Sausner |
The End of the World Heartland Payment System's CEO predicts 2010 will be the year that the payments chain becomes significantly more secure. |
U.S. Banker September 2007 Glen Fest |
Card Security: Banks to Merchants: Toe the Line The PCI digital security standard is here, but retailers are struggling with compliance. Analysts say it'll take two years to build a totally secure environment to protect card data. |
Bank Systems & Technology March 17, 2010 Penny Crosman |
Fifth Third to Encrypt Card Payments End to End The bank is working with 180,000 merchants to secure card payments from merchant terminals to payment processor. |
Bank Systems & Technology December 21, 2007 Maria Bruno-Britz |
PCI Council and Visa See More PCI Compliance Merchants are complying with PCI Data Security Standards now more than ever. |
CIO November 2, 2010 Robert McMillan |
Tokenization: Five Things CIOs Need To Know Data breaches are expensive. One way to reduce the risk is to cut down on the places that handle sensitive data. Enter tokenization. |
U.S. Banker March 2010 Karen Epper Hoffman |
Mounting Pressure Banks and processors push merchants forward to meet card security deadline. |
Entrepreneur February 2007 Melissa Campanelli |
Pay It Safe Security standards might make you rethink your payment system. |
U.S. Banker March 2009 Glen Fest |
The Emperor's Old Clothes Still Don't Fit With the potential to be the new poster child for data breach notoriety, Heartland Payment Systems of New Jersey responded quickly to its massive security breach. |
Bank Technology News March 2009 Rebecca Sausner |
Heartland's Lonely Quest For Reform Heartland Payment Systems deals with perhaps the largest data breach ever. |
Bank Technology News August 2010 John Adams |
Friends When it Comes To the Breach Wars Christopher Kenyon, evp and CIO for the global payments processing subsidiary of U.S. Bancorp, recently discussed sharing of security info among processors and security interoperability. |
Bank Systems & Technology June 22, 2010 Penny Crosman |
PCI Council to Give Banks Extra Time to Adapt to Security Standards Moving its standards for securing payment card-related data, applications and terminals to a three-year lifecycle to give members more time to get used to them and offer feedback. |
Bank Technology News March 2010 Bruce Rutherford |
What's Ahead For PCI? As more businesses implement Payment Card Industry Data Security Standard as a necessary layer in protecting their customers' account data, increased vigilance will help result in fewer breaches, not to mention losses for businesses, financial institutions and cardholders. |
Bank Systems & Technology August 24, 2010 Penny Crosman |
Verizon Cloud PCI Compliant, Ready for Payment Apps Banks and other companies can potentially run payment applications in Verizon's data centers. |
Bank Systems & Technology June 30, 2009 Nathan Conz |
Heartland Completes First Phase of Encryption Pilot Heartland Payment Systems announces it has successfully completed an AES-encrypted transaction process from a merchant card reader through to a processor network. |
InternetNews December 17, 2007 Andy Patrizio |
Updating PCI Compliance Tools New version of QualysGuard breaks down the task of insuring safe transactions by department for step-by-step security testing. |
Bank Systems & Technology August 3, 2009 Maria Bruno-Britz |
Almost 600,000 Affected by Network Solutions Data Breach Web hosting company Network Solutions revealed Friday that unauthorized code was used to transfer the credit and debit card information from the e-commerce websites of 4,343 of its merchant clients to servers outside the company. |
U.S. Banker September 2007 John Bingham |
Data Breaches' Sophistication Prompt 'Digital Dozen' Standards Taking measures to prevent and deter data breaches is the best approach to avoiding the high cost of fraud. Collaborations among Visa, MasterCard, American Express, Discover Card and JCB created a common industry security requirement known as the Payment Card Industry Data Security Standard. |
CRM March 2, 2012 Raul Ortega |
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. |
InternetNews September 19, 2008 Sean Michael Kerner |
Does PCI Compliance Equal Security? The need for regulatory compliance is driving spending on security. Yet is it actually improving security overall? |
Bank Technology News January 2011 |
11 Bank IT Trends for 2011 Regulatory changes and transaction escorts are among the banking trends for 2011. |
InternetNews September 25, 2009 |
Companies Still Not Securing Customer Data New data security survey finds 71 percent admit that cost and lack of resources keeps them from making data security a top priority. |
InternetNews November 17, 2010 |
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. |
InternetNews April 19, 2011 |
Does PCI-DSS Matter? New report shows a correlation between PCI compliance and data breaches. |
InternetNews October 19, 2009 |
Can Twitter Founder's iPhone Venture Take Off? Jack Dorsey's betting on a dongle for his next big hit. |
Bank Technology News September 2009 Rebecca Sausner |
1) Heartland Payment Systems Heartland Payment System's E3, an end-to-(almost) end encryption process, has the greatest potential of any new product to impact the security of America's financial system in the coming year. |
InternetNews November 1, 2010 |
What the PCI-DSS 2.0 Security Standard Means What's new and what's still missing is the latest update to the security standard for payment and merchant systems? |
CIO October 1, 2003 Lorraine Cosgrove Ware |
By the Numbers It's not just what you send, it's what you store that needs encryption. |
InternetNews November 16, 2007 Sean Gallagher |
Security Sweep Finds Retailer's Wi-Fi Networks At Risk A majority of the wireless network devices found at retailers are ripe for potential compromise, a recent survey by a wireless security firm has found. |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it? |
CIO May 13, 2010 David Carr |
PCI Compliance: Five Things You Need to Know The Payment Card Industry Data Security Standards are the floor, not the ceiling for data secruity. Good organizations go beyond cramming for annual PCI reviews. |
InternetNews May 8, 2009 Alex Goldman |
Heartland Hit With $12M Breach Tab The credit card payment processor is disputing fines from MasterCard and Visa, but the security breach turned what would have been a profitable quarter into a loss. |
Information Today March 2006 Phillip Britt |
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. |
JavaWorld August 2002 Ray Djajadinata |
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. |
Bank Systems & Technology June 29, 2009 Maria Bruno-Britz |
Bank of America, First Data to Form 'Next-Gen' Payments Company Banc of America Merchant Services is being created to deliver merchants and consumers with a variety of secure, convenient payment features. |
Entrepreneur November 2004 Amanda C. Kooser |
The I's Have It A more secure wireless standard is on its way and major manufacturers are expected to implement the new standard with a focus on business hardware first. |
InternetNews October 28, 2008 Richard Adhikari |
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. |
InternetNews April 17, 2009 Alex Goldman |
Report: Credit Cards Plentiful in Crime Networks There are so many credit cards in criminal markets that their price has dropped, leading to a new target: PIN numbers. |
InternetNews July 20, 2009 |
Use Risk Management to Make Security Proactive Changing the IT culture can deliver benefits such as business/IT alignment, but it's not easy - it must be lead from the top. |
InternetNews July 9, 2009 Alex Goldman |
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. |
InternetNews April 2, 2007 Andy Patrizio |
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. |
Bank Systems & Technology June 1, 2004 George V. Hulme |
Ingrian Networks Helps Union Bank Protect Customer Data Better Vendor's DataSecure platform boosts bank's encryption capabilities and improves key management. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
InternetNews September 12, 2006 Sean Michael Kerner |
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. |