Business process security News
October 02, 2015
News roundup: Despite a low adoption rate going into the liability shift, many in the industry are optimistic about the future of EMV use. Plus: TrueCrypt flaws; AWS crypto keys stolen; women in infosec.
October 01, 2015
The Oct. 1, 2015 deadline for EMV liability has arrived, though merchants and retailers alike aren't ready for the change.
March 03, 2015
Banks are rushing to fix sloppy authentication processes at the heart of rising Apple Pay fraud. Experts also worry about potential fraud with other mobile payment systems.
September 19, 2014
The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security.
Business process security Get Started
Bring yourself up to speed with our introductory content
Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS). Continue Reading
Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in... Continue Reading
Blockchain is a type of distributed ledger that stores a permanent and tamper-proof record of transaction data. Distributed ledgers can be thought of as a type of database, but unlike traditional databases, distributed ledgers are managed through a ... Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Business process security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Blockchain technology applications have generated a buzz among many industries, and those connected to finance stand to gain -- and be changed -- the most. Here's a quick look at why blockchain matters. Continue Reading
Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can help with PCI DSS compliance. Continue Reading
Tokenization is a key technology underlying Apple Pay, promising to boost payment data security. Mike Chapple examines how Apple Pay's tokenization system works, and whether it will provide any PCI DSS compliance relief. Continue Reading
Manage Business process security
Learn to apply best practices and optimize your operations.
Monitoring customer behavior across multiple channels would help banks fight fraud, but today's fraud detection technology isn't there yet. In this tip, financial services expert Jerry Silva explains how banks could benefit from the concept of "... Continue Reading
In this video get tips from expert Eric Holmquist on how to handle vendors to optimize security and minimize risk. Topics include risk assessment, due diligence best practices, common mistakes financial firms make in their vendor management programs... Continue Reading
Fraud losses involving RDC technology have the potential to skyrocket if banks don't work proactively to deal with the risks, research firm says. Continue Reading
Problem Solve Business process security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider. Continue Reading
Merchants need to balance buyers' online experiences and their controls for analyzing suspicious purchasing behavior to prevent card-not-present scams. Continue Reading
Implementing data analytics tools to examine transactions will help companies detect fraud and prevent losses for their customers. Continue Reading