Skip to the main content.
Contact

Blog

Be in touch with our latest news

pci (7)

What Is The Difference Between Masking And Truncation In PCI Compliance?

Masking and truncation of cardholder data may seem the same on the surface (eg. 423456XXXXXX7890); however, each implies different functionality.

Read More >

What Is Cardholder Data In PCI Compliance?

Cardholder data, aka CHD, comes from credit, debit, and prepaid cards bearing the logo of one of the PCI founding card brands. CHD includes the...

Read More >

5 min read

Call Centers and PCI Compliance: Things You Need to Know

Call centers can be challenging places. They range from small and simple to large and complex. For many businesses they are a place where new...

Read More >

1 min read

4 FAQs The PCI Security Standards Council Renamed in 2016

Anyone who relies on the PCI FAQ site for guidance may have noticed some changes in the last few months. In fact if you bookmarked some of the links...

Read More >

3 min read

PCI Announces NESA - A Stepping Stone To P2PE

Earlier this month the PCI Security Standards Council published a new document as part of the Point-to-Point Encryption (P2PE) program. This initial...

Read More >

4 min read

PCI Compliance Footprints: 7 Ways To Simplify Compliance, Reduce Risk And Save Money

While you may have heard of carbon footprints and ecological footprints, you might not be aware that there is such thing as a PCI Compliance...

Read More >

2 min read

3 Risks of Ignoring PCI Compliance

With more than 510 million records containing sensitive information breached since January 2005, statistics indicate that cardholder data breaches...

Read More >

1 min read

What's changed in PA-DSS 3.2? Impacts to Vendors, Implementers, and Operators.

Recently, Control Gap posted an article performing a detailed analysis of the recent changes in the DSS due to 3.2. We do this because the high-level...

Read More >

3 min read

PCI DSS: Guide to Effective Daily Log Monitoring

Despite the widespread adoption of logging as part of operational security practices, organizations have continued to be challenged in harnessing the...

Read More >