Remove point-to-point-encryption-p2pe
article thumbnail

Black Friday and Cyber Weekend: Navigating the Tumultuous Waters of Retail Cybersecurity

Thales Cloud Protection & Licensing

The Indispensable Role of End-to-End Encryption in the Age of Mobile Wallets Mobile wallets and online transactions are now as commonplace as physical cash transactions. Today, using Point-to-Point Encryption (P2PE) isn't just a luxury; it's a necessity. For retailers, this poses a two-pronged challenge.

Retail 83
article thumbnail

Is Your Chip Card Secure? Much Depends on Where You Bank

Krebs on Security

Newer, chip-based cards employ a technology known as EMV that encrypts the account data stored in the chip. The technology causes a unique encryption key — referred to as a token or “cryptogram” — to be generated each time the chip card interacts with a chip-capable payment terminal.

Security 357
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PCI DSS: Which PCI SAQ is Right for My Business?

IT Governance

For merchants that don’t store card data in electronic format but use IP-connected POI (point-of-interaction) devices. For merchants that process cardholder data via POS (point-of-sale) systems or other payment application systems connected to the Internet. What is a PCI SAQ?

article thumbnail

Leveraging tokenization services from the major card brands

Thales Cloud Protection & Licensing

In the recent Thales eSecurity eBook, ‘ PCI Compliance and Data Protection for Dummies ’, we cover the main technologies that can be used, such as encryption and tokenization, to help with such efforts in protecting the payment prior to a successful authorization and secure storage of selected elements afterwards.

article thumbnail

Choose the right SAQ to demonstrate PCI DSS compliance

IT Governance

For merchants that don’t store card data in electronic format but use IP-connected point-of-interaction (POI) devices. For merchants that process cardholder data via point-of-sale (POS) systems or other payment application systems connected to the Internet. SAQ P2PE-HW. For those that don’t fit into any of the above categories.

article thumbnail

Expert Insight: Stephen Hancock

IT Governance

It’s a relatively short SAQ, with only one more question than the shortest SAQ, P2PE [point-to-point encryption], and covering just 4 of the Standard’s 12 high-level requirements, so a good way of reducing the PCI DSS compliance burden for smaller merchants in particular. We sat down to chat to him.

article thumbnail

Hardware security still essential at the heart of the payments infrastructure

Thales Cloud Protection & Licensing

Through the PCI documentation they have deemed that using software-based cryptography for all of these tasks could result in: Malware used to capture keys and sensitive data from server memory; Manipulation of PIN blocks in transit; and, The compromise of key-encrypting keys (used to secure cryptographic zones).