Payments security experts are warning of the risks to some merchants with payment systems that transmit cardholder data from the processor back to the point of sale from the Spectre and Meltdown computer chip flaws.
The recent explosion of activity around biometrics and other new forms of authentication should seem like a good thing for the development of connected commerce. But right now it's more of a wild west that needs to be tamed.
Before using Amazon Web Services (AWS), it’s important to understand that as an IaaS provider, AWS is only responsible by default for the security of its cloud infrastructure. AWS goes through great efforts to make customers aware of their responsibilities through the AWS Shared Responsibility Model. The web pages explaining the basics of AWS services frequently reference the model to offer complete transparency into which responsibilities are always taken care of by AWS and which are to be handled by the customer.This white paper is intended to help you make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization’s situation and needs.
To help its member banks avoid the nightmare of a data breach, Swift is requiring they take the necessary security steps to establish a strong baseline of cyber defense. And Swift intends to make sure its banks all follow the same procedures.
Consumers are increasingly concerned about payment card fraud, but it remains to be seen how much work they’re willing to do to protect themselves when they’re not directly liable for monetary losses from stolen cards.
As incidents such as the Equifax breach create more urgency to move beyond static identifiers and authentication methods, Visa is getting aggressive about pushing dynamic tools to vet and shield identity.