MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Bank Technology News
November 2010
John Adams
PCI Struggles to Keep Up with Industry Advances The payments industry is embracing point-to-point encryption and tokenization rapidly, in fact much faster than the PCI Security Standards Council can come up with rules that grant its stamp of approval on the advanced technology. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
Bank Technology News
July 2010
John Adams
Fifth Third Processing's Encryption is the Living End-to-End Fifth Third Processing Solutions is joining the encryption and tokenization fray, offering broad new personal data protections in a marketplace that's getting long on solutions while remaining short on standards and interoperability. mark for My Articles similar articles
U.S. Banker
March 2010
Karen Epper Hoffman
Mounting Pressure Banks and processors push merchants forward to meet card security deadline. mark for My Articles similar articles
Bank Systems & Technology
March 17, 2010
Penny Crosman
Fifth Third to Encrypt Card Payments End to End The bank is working with 180,000 merchants to secure card payments from merchant terminals to payment processor. mark for My Articles similar articles
Bank Technology News
November 2009
Rebecca Sausner
The End of the World Heartland Payment System's CEO predicts 2010 will be the year that the payments chain becomes significantly more secure. mark for My Articles similar articles
Bank Technology News
August 2010
John Adams
Friends When it Comes To the Breach Wars Christopher Kenyon, evp and CIO for the global payments processing subsidiary of U.S. Bancorp, recently discussed sharing of security info among processors and security interoperability. mark for My Articles similar articles