Tag Archives: visa

Chris Mark in Jan 2013 TransactionWorld: “Only Certainies are Death, Taxes, and PCI DSS.”

Chris Mark (this guy with two thumbs) is in the January 2013 edition of TransactionWorld Magazine.  You can read my article titled: “In 2013 the only certainties are Death, Taxes, and the PCI DSS” in which I opine about the … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

Chris in October 2012 Issue of PenTest Magazine

Check out the October 2012 issue of PenTest Magazine for tons of valuable information on the PCI DSS and how Pen Testing can be used to support compliance and validation.  I have an article in the magazine titled: “Introduction to … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

“August 2012 TransactionWorld Magazine” – Chris & Heather Mark’s Articles

Chris and Heather Mark both have articles in the August 2012 issue of TransactionWorld Magazine.  Chris’ is titled: “The Impact of the Fortress Mentality  & Today’s Compliance Strategies” while Heather’s is titled: “After the Compromise; Security Incident Response and Mitigating … Continue reading

Posted in cybersecurity, Data Breach, Industry News | Tagged , , , , , , , , | Leave a comment

2012 European Central Bank Report on Card Fraud

In July 2012 the European Central Bank released a report on bank card (debit, credit, etc.) fraud in the Single Euro Payment Area (SEPA).  According to the report, the total fraud equaled €1.26 billion in 2010.  For those in the … Continue reading

Posted in News | Tagged , , , , , , , , , , , | Leave a comment

“The Fortress Mentality & Data Compromises” – Chris & Heather Mark in August 2012 TransactionWorld Magazine

This month’s TransactionWorld magazine includes an article by me (Chris Mark) titled: “The Impact Of the Fortress Mentality and Today’s Compliance Strategies”.  The article discusses, among other things, the Global Payments breach, PCI DSS compliance, and provides an overview and … Continue reading

Posted in cybersecurity, Data Breach | Tagged , , , , , , , , , | Leave a comment