New PCI DSS Standards - No Worries If You Automate and Normalize

Mehta, Kamlesh
December 2008
Security: Solutions for Enterprise Security Leaders;Dec2008, Vol. 45 Issue 12, p58
Trade Publication
The article reports on the new Version 1.2 Data Security Standards (DSS) released by the Payment Card Industry (PCI) Council, which will offer improved flexibility to address security challenges. It relates that the DSS impact all types of enterprises and can create risk beyond retail operations. Moreover, it contends that automating the process of tracking all information technology (IT) changes and configuration helps future proof processes against new revisions to existing PCI requirements.


Related Articles

  • Home-Network Security Model in Ubiquitous Environment. Dong-Young Yoo; Jong-Whoi Shin; Jin-Young Choi // Proceedings of World Academy of Science: Engineering & Technolog;Dec2007, Vol. 36, p644 

    Social interest and demand on Home-Network has been increasing greatly. Although various services are being introduced to respond to such demands, they can cause serious security problems when linked to the open network such as Internet. This paper reviews the security requirements to protect...

  • Tips For Ensuring Robust Pipeline SCADA Security.  // Pipeline & Gas Journal;Nov2007, Vol. 234 Issue 11, p58 

    The article provides tips for ensuring robust pipeline supervisory control and data acquisition (SCADA) security. The author points out that it is not enough to do one assessment and then assume that no further checks will be needed in the future. He also emphasizes that it is critically...

  • The basics of good security.  // Computer Weekly;9/19/2006, p30 

    The article focuses on the importance of maintaining effective Information Technology (IT) security in organizations. Companies make efforts to block every gap in their networks to secure data. IT directors have to give attention to the changing techniques that threaten the business priorities....

  • SAT-based model-checking for security protocols analysis. Armando, Alessandro; Compagna, Luca // International Journal of Information Security;Jan2008, Vol. 7 Issue 1, p3 

    We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of the protocol in a multi-set rewriting formalism and a positive integer k, builds a propositional formula whose models...

  • People and Processes Outweigh Technology in Effective Government Information Security.  // International Journal of Micrographics & Optical Technology;2007, Vol. 25 Issue 1/2, p7 

    The article provides information on the 2006 Global Information Security Workforce Study, conducted by analyst firm IDC. The report states that the U.S. government's efforts to improve its overall security position through compliance with stringent information security mandates is increasing the...

  • Making the Grade. McCLEAN, CHRIS // Information Security;Jul/Aug2010, Vol. 12 Issue 6, p10 

    The article discusses the need for a framework in the evaluation of the process maturity of functions within the security organization. A maturity assessment presents the work of the security department, assists in security planning, and shows the progress of security investments. The score...

  • Image Based Authentication Using Steganography Technique. Sonker, Satish Kumar; Kumar, Sanjeev; Kumar, Amit; Singh, Pragya // International Journal of Advanced Research in Computer Science;May/Jun2013, Vol. 4 Issue 3, p277 

    In the world of Information Security we are generally using Traditional (Text based) or multi factor Authentication Approach. Through which we are facing a lot of problems and it's also less secure too. In these types conventional method attacks like brute-force attack, Dictionary Attack etc.,...

  • New threats or old? It's both. Morbin, Tony // SC Magazine: For IT Security Professionals (UK Edition);Jan/Feb2014, p5 

    The author ponders on challenges and opportunities surrounding the information technology (IT) sector. He cites the efforts to secure funds to meet the challenges of the cloud, mobile, and other mobile-related systems, and notes the claim of Thomas Brewster that allowing roll-out of secure...

  • 5 Questions For a Successful Deployments of an IP Video Solution. Mike Kuhn // SDM: Security Distributing & Marketing;Apr2009, Vol. 39 Issue 4, p78 

    The article presents questions and answers related Internet Protocol (IP) Video Solutions including information technology (IT) Department's Network standards, the importance of recorded video to clients and significance of scalability in a security system.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics