Skip to the main content.
Contact
Contact

Blog

Be in touch with our latest news

pci (6)

1 min read

What The CIA WikiLeaks Dump Has In Common With PCI Compliance

In recent news, WikiLeaks exposed a huge trove of CIA documents.  Journalists and bloggers will of course have a field day with this and the general...

Read More >

2 min read

SHA-1 Is Dead!

History The SHA-1 cryptographic hash function was introduced in 1995. Weaknesses began to be discovered in 2005, and in 2011 NIST deprecated SHA-1....

Read More >

What Is The Difference Between Masking And Truncation In PCI Compliance?

Masking and truncation of cardholder data may seem the same on the surface (eg. 423456XXXXXX7890); however, each implies different functionality.

Read More >

What Is Cardholder Data In PCI Compliance?

Cardholder data, aka CHD, comes from credit, debit, and prepaid cards bearing the logo of one of the PCI founding card brands.  CHD includes the...

Read More >

5 min read

Call Centers and PCI Compliance: Things You Need to Know

Call centers can be challenging places. They range from small and simple to large and complex. For many businesses they are a place where new...

Read More >

1 min read

4 FAQs The PCI Security Standards Council Renamed in 2016

Anyone who relies on the PCI FAQ site for guidance may have noticed some changes in the last few months. In fact if you bookmarked some of the links...

Read More >

3 min read

PCI Announces NESA - A Stepping Stone To P2PE

Earlier this month the PCI Security Standards Council published a new document as part of the Point-to-Point Encryption (P2PE) program. This initial...

Read More >

3 min read

PCI Compliance Footprints: 7 Ways To Simplify Compliance, Reduce Risk And Save Money

While you may have heard of carbon footprints and ecological footprints, you might not be aware that there is such thing as a PCI Compliance...

Read More >

2 min read

3 Risks of Ignoring PCI Compliance

With more than 510 million records containing sensitive information breached since January 2005, statistics indicate that cardholder data breaches...

Read More >