Latest Posts
Popular data security articles: the most-read PCI DSS compliance and data security posts.
Application Security
PCI Secure Coding Training Requirements
PCI DSS requires following secure coding guidelines and requires developers to educate themselves on the latest best practices. Learning software security also requires changes in your approach to programming.
Access Control
PCI DSS Remote Access Requirements – What You Need to Know
The remote connection of employees to the cardholder data environment has forced many companies to implement continuity plans for remote connection scenarios. It also enabled testing of PCI DSS 12.10 requirement, which requires an incident response plan that includes business disaster recovery and business continuity actions.
PCI DSS
PCI DSS and Revenue Management
When diving into revenue management, dealing with PCI DSS is inevitable. Card transactions are a significant portion of today’s streams of revenue. With further digitalization, its integration will become inescapable.
Data Flow Diagrams
PCI DSS Network and Data Flow Diagrams
High-level and detailed network diagrams and data flow diagrams are mandatory PCI DSS requirements and are essential components of any successful PCI Compliance Report (RoC).
Business Continuity
PCI DSS Disaster Recovery Requirements
Essentially, PCI DSS is not concerned with disaster recovery. PCI doesn't care if transactions can be recovered; PCI DSS only cares about whether sensitive authentication data (SAD) and cardholder data (CHD) are secure.
Data Center Security
PCI Compliant Data Center Requirements
Data centers generally support the storage, processing, and transmission of data. This data is potentially vulnerable to theft and misuse. As a result, PCI DSS has a set of requirements to establish best practices and mitigate attack vulnerabilities.
PCI DSS Requirement 12
What Are the PCI DSS Third-Party Service Provider Management Requirements
PCI Requirement 12.8 focuses on vendor management and mandates that companies develop and execute policies and processes to manage service providers with whom cardholder data is shared or who may compromise cardholder data security.
Want to stay up to date with the latest news?
We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!