In the latest weekly update, ISMG editors discuss how organizations can comply with the new PCI DSS 4.0 requirements, whether other countries should follow the U.S. lead on legislating software bills of materials, and key strategies for CISOs preparing for an economic downturn.
The transition to PCI DSS v4.0 is a major inflection point for the payments industry – not only does it restructure how risk is assessed, but it also provides a better foundation for meeting ongoing technical innovation. While organizations with mature programs may need comparatively little uplift, all organizations...
Software point of sale or SoftPOS is a groundbreaking technology that allows businesses to accept card payments directly on their devices without requiring any additional software. As this payment method gains widespread adoption, what does it mean for the security of our payments systems?
The global payments risk landscape has evolved dramatically during the past 2.5 years of accelerated digital transformation. Mahmoud Abdelkader, CEO of Very Good Security, outlines how these changes have affected the payments environment and how they are reflected in the latest PCI update.
Check out this guide to PCI-as-a-Service and why it's killing the DIY approach. Get a detailed overview of all of the necessary steps that companies would need to take when adopting an in-house approach to PCI compliance and how PCIaaS solves these challenges. Enabling a fast, simple, and cost-effective path to PCI...
PCI DSS compliance is not simply a cost of doing business – it's a valuable security certification that comes with several essential advantages.
In this infographic, you’ll learn the benefits of establishing PCI compliance as well as the many risks that companies take when they don’t adhere to PCI...
The PCI Security Standards Council set (12) technical and operational requirements for use as an essential part of an organization's validation process for PCI Compliance. Download Very Good Security's (VGS) comprehensive checklist to help you expedite PCI DSS.
A comprehensive ebook on everything organizations need to know about PCI DSS compliance, including
a cost breakdown, a comparison of different implementation approaches, case studies, and a
checklist for evaluating potential PCI compliance assessors.
Learn the major cost components of obtaining PCI DSS Compliance and how much organizations of different sizes should expect to pay; as well as three essential strategies for reducing (or eliminating) these expenses and how Very Good Security (VGS) can help organizations achieve all three simultaneously.
The PCI Security Standards Council on Thursday released the Payment Card Industry Data Security Standard version 4.0. The latest version's improvements are intended to counter evolving threats and technologies, and the new version will enable innovative methods to combat new threats.
Learn about the history of PCI DSS and what's expected with the release of PCI DSS 4.0, including:
Details on how PCI DSS has changed with each new iteration since 2004;
Information on the additional requirements of PCI 4.0 for designated entities;
Knowledge on the expected rise in adoption of the PCI...
Gain an understanding of what PCI compliance requires of organizations as well as the true cost of obtaining compliance, including:
What benefits your company will enjoy by investing in PCI compliance;
The cost of non-compliance, including data breach costs;
A breakdown of upfront and ongoing costs for each...
In this guide, we cover the importance of sensitive data and compliance for your organization when it comes to issuing payment cards. You will learn:
PCI compliance responsibilities for your card issuing business
Ways that you can retain full ownership over your data while gaining the most utility from it;...
Two states have recently taken steps to bolster cybersecurity and data privacy protections. Connecticut has enacted a law designed to give certain legal protections to businesses that adhere to cybersecurity frameworks. And a new data privacy law in Colorado allows individuals to opt out of data collection.
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.