PCI: Something borrowed

PCI: Something borrowed
PCI: Something borrowed
For many companies that process credit cards or retail customers' credit card data, the requirements of the Payment Card Industry Data Security Standard (PCI DSS) are all too familiar. But should companies that do not process credit cards implement the same data security restrictions as mandated for those that do? In this latest ebook from SC Magazine, we examine how even those companies not needing to adhere to the credit card guidance can benefit from the rules that PCI DSS lays out. Encryption and logging technologies are a boon to any company in need of protecting its internal or customer data. And some smaller companies are benefitting from promoting their businesses as PCI compliant.
close

Next Article in Research

Advertisement

How to Prevent Insider Threats!

POLL

More in Research

2013 eBook on surviving SIEM

2013 eBook on surviving SIEM

Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.

2013 eBook on cyber espionage

2013 eBook on cyber espionage

Nation-states can now skip over costly and time-consuming R&D by stealing corporate and government data and turning that information into a competitive advantage.

2013 eBook on Advanced Persistent Threats

2013 eBook on Advanced Persistent Threats

APTs - most often taking the form of cyber criminal campaigns out for financial gain or trade secrets - have impacted some of the largest organizations and government agencies in ...