TITLE

New PCI DSS Standards - No Worries If You Automate and Normalize

AUTHOR(S)
Mehta, Kamlesh
PUB. DATE
December 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Dec2008, Vol. 45 Issue 12, p58
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the new Version 1.2 Data Security Standards (DSS) released by the Payment Card Industry (PCI) Council, which will offer improved flexibility to address security challenges. It relates that the DSS impact all types of enterprises and can create risk beyond retail operations. Moreover, it contends that automating the process of tracking all information technology (IT) changes and configuration helps future proof processes against new revisions to existing PCI requirements.
ACCESSION #
35714732

 

Related Articles

  • Tips For Ensuring Robust Pipeline SCADA Security.  // Pipeline & Gas Journal;Nov2007, Vol. 234 Issue 11, p58 

    The article provides tips for ensuring robust pipeline supervisory control and data acquisition (SCADA) security. The author points out that it is not enough to do one assessment and then assume that no further checks will be needed in the future. He also emphasizes that it is critically...

  • The basics of good security.  // Computer Weekly;9/19/2006, p30 

    The article focuses on the importance of maintaining effective Information Technology (IT) security in organizations. Companies make efforts to block every gap in their networks to secure data. IT directors have to give attention to the changing techniques that threaten the business priorities....

  • Home-Network Security Model in Ubiquitous Environment. Dong-Young Yoo; Jong-Whoi Shin; Jin-Young Choi // Proceedings of World Academy of Science: Engineering & Technolog;Dec2007, Vol. 36, p644 

    Social interest and demand on Home-Network has been increasing greatly. Although various services are being introduced to respond to such demands, they can cause serious security problems when linked to the open network such as Internet. This paper reviews the security requirements to protect...

  • SAT-based model-checking for security protocols analysis. Armando, Alessandro; Compagna, Luca // International Journal of Information Security;Jan2008, Vol. 7 Issue 1, p3 

    We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of the protocol in a multi-set rewriting formalism and a positive integer k, builds a propositional formula whose models...

  • People and Processes Outweigh Technology in Effective Government Information Security.  // International Journal of Micrographics & Optical Technology;2007, Vol. 25 Issue 1/2, p7 

    The article provides information on the 2006 Global Information Security Workforce Study, conducted by analyst firm IDC. The report states that the U.S. government's efforts to improve its overall security position through compliance with stringent information security mandates is increasing the...

  • Image Based Authentication Using Steganography Technique. Sonker, Satish Kumar; Kumar, Sanjeev; Kumar, Amit; Singh, Pragya // International Journal of Advanced Research in Computer Science;May/Jun2013, Vol. 4 Issue 3, p277 

    In the world of Information Security we are generally using Traditional (Text based) or multi factor Authentication Approach. Through which we are facing a lot of problems and it's also less secure too. In these types conventional method attacks like brute-force attack, Dictionary Attack etc.,...

  • Making the Grade. McCLEAN, CHRIS // Information Security;Jul/Aug2010, Vol. 12 Issue 6, p10 

    The article discusses the need for a framework in the evaluation of the process maturity of functions within the security organization. A maturity assessment presents the work of the security department, assists in security planning, and shows the progress of security investments. The score...

  • How to secure your small business. Kidman, Angus // Australian PC User;Jun2007, Vol. 19 Issue 6, p41 

    The article presents advice on how to protect one's business information technology (IT) without spending too much. One option is to farm out IT security management to managed services, which monitors incoming electronic mail to eliminate spam and malware before it arrives, or cover the entire...

  • 5 Questions For a Successful Deployments of an IP Video Solution. Mike Kuhn // SDM: Security Distributing & Marketing;Apr2009, Vol. 39 Issue 4, p78 

    The article presents questions and answers related Internet Protocol (IP) Video Solutions including information technology (IT) Department's Network standards, the importance of recorded video to clients and significance of scalability in a security system.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics