How do I contact the payment card brands?
Contact details for the payment brands are provided below:
American Express
- Website: http://www.americanexpress.com/datasecurity
- Email: AmericanExpressCompliance@trustwave.com
Discover - Website: …
Latest changes to PCI SSC frequently asked questions.
Contact details for the payment brands are provided below:
American Express
Discover - Website: …
Contact details for the payment brands are provided below:
American Express
Discover - Website: http://www.discovernetwork.com/merchants/data-security/index.html - …
Whether an MPLS network can be considered a private network is dependent upon the specific provider and configuration of that network. The implementation would need to be evaluated to determine …
Although log correlation is a valuable tool in a company?s information security strategy, it is not a replacement for intrusion detection mechanisms, such as IDS/IPS. Intrusion detection mechanisms provide proactive …
PCI DSS Requirement 4.1 states that strong cryptography and security protocols must be used to safeguard sensitive cardholder data during transmission over open, public networks. Bluetooth technology is included in …
The intent of this requirement is to prevent an unauthorized person from using an unattended console/PC to gain access to the user’s computer and accounts, and potentially to the company’s …
For PCI DSS Requirement 4.1, digital leased lines are generally considered to be private since they are dedicated to the individual customer’s traffic.
This determination, however, is dependent upon …
An inactive user account is one that has not been used in over 90 days. Inactive accounts are often targets for attackers since they are generally not monitored, and changes …
FTP is considered an insecure protocol as it does not provide protection for its communication channel or logon details.
PCI DSS Requirement 1.1.6 states that firewalls and router configurations …
PCI DSS Requirement 4.1 states that transmission of cardholder data over an open or public network must be secured using strong cryptography and security protocols. Examples provided in the requirement …