Your search results for

369 results:
311. Whitepaper: The Choice is Yours - Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance   Whitepaper: The Choice is Yours - Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance By adopting a truly effective data security strategy, organizations can avoid financially crippling,…  
312. Whitepaper: Three Key Risks & Opportunities of GDPR   Whitepaper: Three Key Risks & Opportunities of GDPR This white paper explores three key risks and opportunities that information security and risk management professionals should consider when…  
313. Whitepaper: PCI DSS as a Foundation for GDPR Compliance   Whitepaper: PCI DSS as a Foundation for GDPR Compliance For companies striving to become GDPR compliant, the PCI DSS can used as a useful point of reference for a number of GDPR requirements. While…  
314. Enterprise Tokenization - Core Concepts & Architecture   Enterprise Tokenization - Core Concepts & Architecture SecurDPS Enterprise – the Secure Data Protection Suite designed for organizations of all sizes - combines the comforte patented stateless…  
315. MPSI Secures Growth with GDPR and PCI Compliant Data Protection   MPSI Secures Growth with GDPR and PCI Compliant Data Protection Mercury Processing Services International is a payments processing company based in Croatia and Slovenia. They serve over 5.6 million…  
316. Tandem Advanced Command Language (TACL) Cheat Sheet   Tandem Advanced Command Language (TACL) Cheat Sheet Whether you are new to TACL or quite a seasoned expert, TACL has a rich syntax and can be hard to learn and to remember. Our TACL Cheat Sheet will…  
317. Government Savings Bank Implements PCI Compliant Data Protection   Government Savings Bank Implements PCI Compliant Data Protection Government Savings Bank (GSB) has the largest network of ATMs and branches in Thailand with nearly 6,000 ATMS and over 1,000 branches…  
318. uLinga - Cutting the Ties to Legacy Networks!   uLinga - Cutting the Ties to Legacy Networks! Infrastructure is converging! Industry standards are pushing aside proprietary technology and today’s corporations value convergence around a single…  
319. How to Secure Sensitive Data in Cloud Environments   How to Secure Sensitive Data in Cloud Environments Data breaches can cause severe damages to businesses processing sensitive data. To protect sensitive payment card holder data, PCI-DSS demands…  
320. SecurLib / DataEncryption   SecurLib / DataEncryption In the past few years, database encryption has become a critical component of an organization’s security strategy. It is required not only to adhere to industry best…  
Search results 311 until 320 of 369