Using PCI DSS Criteria for PII Protection

Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted standard that applies internationally to any organization that accepts, captures, stores, transmits or processes credit and debit card data. Many organizations, however, have mandates to protect Personally Identifiable Information (PII). In contrast with PCI, PII directives are often vague and offer wider latitude and less guidance for specific controls. This paper presents how organizations can benefit from using PCI guidelines and solutions for PII data compliance.

Spotlight

QuintessenceLabs

"Founded in 2006, QuintessenceLabs addresses the most difficult security challenges facing companies, helping implement robust security strategies to protect data today and in the future. QuintessenceLabs products include: - an enterprise scale true random number generator delivering full entropy random at 1 Gbit / sec - a vendor neutral, centralized key and policy manager with fine grained policy management and logging and true random keys - one-time pad protection for recording and storage devices in uncontrolled environments"

OTHER WHITEPAPERS
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

Global Threat Landscape Report A Semiannual Report by FortiGuard Labs

whitePaper | August 16, 2022

Another half-year through unprecedented times has passed. But as unique as these times may feel, we continue to see familiar exploits, names, and attacks taking up space. To help you and your business feel confident in your ability to protect yourself against the threats that continue to come our way, this report looks back on the cyber threat landscape of the first half of 2022 using our global array of sensors monitored by FortiGuard Labs. Here’s what we learned:

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More

Spotlight

QuintessenceLabs

"Founded in 2006, QuintessenceLabs addresses the most difficult security challenges facing companies, helping implement robust security strategies to protect data today and in the future. QuintessenceLabs products include: - an enterprise scale true random number generator delivering full entropy random at 1 Gbit / sec - a vendor neutral, centralized key and policy manager with fine grained policy management and logging and true random keys - one-time pad protection for recording and storage devices in uncontrolled environments"

Events