Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Qualys Publishes “PCI Compliance for Dummies”

January 2009 by Marc Jacob

Qualys, Inc. announced that the company has published PCI Compliance for Dummies in conjunction with publisher John Wiley & Sons.

PCI Compliance for Dummies is the first accessible, easy-to-read written guide designed to educate merchant organizations about Payment Card Industry (PCI) Data Security Standard (DSS) which is now a mandatory requirement for companies that store, processes, or transmits payment cardholder data. PCI Compliance for Dummies provides the need to know information about PCI DSS and how merchants can best comply with its requirements for secure results. This book is co-authored by Qualys’ Sumedh Thakar and Terry Ramos.

Within its five succinct parts, the PCI compliance guide leads readers through a primer on security risks faced by merchants who accept payment cards and also looks at the PCI requirements themselves and how each applies specifically to the merchant. Further, readers will become familiar with best practices and outlined steps to ensure compliance to prevent cardholder data breaches.

"Gartner surveyed 4,500 consumers who experienced payment card fraud and about a third said they were unsure where the theft occurred," said Avivah Litan, VP and distinguished analyst, Gartner Inc. "Today, data breach at a retailer or other third party is the largest category for known points of cardholder data theft. Through the PCI DSS specifications, merchants are able to better understand the requirements and tools available to prevent these types of senseless cardholder data breaches."

PCI Compliance For Dummies represents the company’s second publication following the successful and informative Vulnerability Management for Dummies which explains the essentials of vulnerability management by educating readers on the available tools to manage vulnerabilities automatically, best practices, the pros and cons of automated vulnerability management as well as a valuable 10-point checklist for removing existing vulnerabilities in the network.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts