Business process security News
October 02, 2015
News roundup: Despite a low adoption rate going into the liability shift, many in the industry are optimistic about the future of EMV use. Plus: TrueCrypt flaws; AWS crypto keys stolen; women in infosec.
October 01, 2015
The Oct. 1, 2015 deadline for EMV liability has arrived, though merchants and retailers alike aren't ready for the change.
March 03, 2015
Banks are rushing to fix sloppy authentication processes at the heart of rising Apple Pay fraud. Experts also worry about potential fraud with other mobile payment systems.
September 19, 2014
The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security.
Business process security Get Started
Bring yourself up to speed with our introductory content
Electronic commerce, or e-commerce, is the transmission of funds or data via the iInternet or another electronic network to facilitate business processes such as the purchase/sales of goods and services. These e-commerce activities include ... Continue Reading
Blockchain is a distributed database based on the Bitcoin model that stores a permanent and tamper-proof ledger of transaction data. Continue Reading
Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Business process security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Blockchain technology applications have generated a buzz among many industries, and those connected to finance stand to gain -- and be changed -- the most. Here's a quick look at why blockchain matters. Continue Reading
Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can help with PCI DSS compliance. Continue Reading
Tokenization is a key technology underlying Apple Pay, promising to boost payment data security. Mike Chapple examines how Apple Pay's tokenization system works, and whether it will provide any PCI DSS compliance relief. Continue Reading
Manage Business process security
Learn to apply best practices and optimize your operations.
Monitoring customer behavior across multiple channels would help banks fight fraud, but today's fraud detection technology isn't there yet. In this tip, financial services expert Jerry Silva explains how banks could benefit from the concept of "... Continue Reading
In this video get tips from expert Eric Holmquist on how to handle vendors to optimize security and minimize risk. Topics include risk assessment, due diligence best practices, common mistakes financial firms make in their vendor management programs... Continue Reading
Fraud losses involving RDC technology have the potential to skyrocket if banks don't work proactively to deal with the risks, research firm says. Continue Reading
Problem Solve Business process security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Merchants need to balance buyers' online experiences and their controls for analyzing suspicious purchasing behavior to prevent card-not-present scams. Continue Reading
Implementing data analytics tools to examine transactions will help companies detect fraud and prevent losses for their customers. Continue Reading
Expert Nick Lewis offers security measures that enterprises, particularly financials, can utilize to fend off Project Blitzkrieg-style DDoS attacks. Continue Reading