PCI Compliance Footprints: 7 Ways To Simplify Compliance, Reduce Risk And Save Money
While you may have heard of carbon footprints and ecological footprints, you might not be aware...
1 min read
David Gamey
:
Mar 14, 2017 12:00:00 AM
In recent news, WikiLeaks exposed a huge trove of CIA documents. Journalists and bloggers will of course have a field day with this and the general public will be spectators to another ongoing drama. From our perspective, thankfully, it sounds like WikiLeaks intends to work with vendors to fix vulnerabilities which will hopefully spare everyone from a shooting gallery of zero-day exploitation.
We, like many of you, were curious. We wondered what useful things might be gleaned from this. In particular, how might PCI DSS, PA-DSS, PIN, and P2PE guidance hold up against the CIA’s guidance? What we found interesting was that after casting off the spy craft stuff like misdirection, misattribution, and uber-stealthy techniques, what was left could easily be taken from a PCI compliance and best practices document:
While you may have heard of carbon footprints and ecological footprints, you might not be aware...
PCI DSS is all about scope. Getting scope right or wrong is perhaps the single most critical factor...
The adoption of 8-digit BINs in 2022 has already created many transitional challenges for...