What Is The Difference Between Masking And Truncation In PCI Compliance?
Masking and truncation of cardholder data may seem the same on the surface (eg. 423456XXXXXX7890);...
1 min read
David Gamey
:
Mar 14, 2017 12:00:00 AM
In recent news, WikiLeaks exposed a huge trove of CIA documents. Journalists and bloggers will of course have a field day with this and the general public will be spectators to another ongoing drama. From our perspective, thankfully, it sounds like WikiLeaks intends to work with vendors to fix vulnerabilities which will hopefully spare everyone from a shooting gallery of zero-day exploitation.
We, like many of you, were curious. We wondered what useful things might be gleaned from this. In particular, how might PCI DSS, PA-DSS, PIN, and P2PE guidance hold up against the CIA’s guidance? What we found interesting was that after casting off the spy craft stuff like misdirection, misattribution, and uber-stealthy techniques, what was left could easily be taken from a PCI compliance and best practices document:
David Gamey :
Jan 17, 2017 10:07:00 PM
Masking and truncation of cardholder data may seem the same on the surface (eg. 423456XXXXXX7890);...
David Gamey :
Nov 26, 2016 10:07:00 PM
While you may have heard of carbon footprints and ecological footprints, you might not be aware...
David Gamey :
Apr 23, 2021 10:07:00 PM
The adoption of 8-digit BINs in 2022 has already created many transitional challenges for...