Remove point-to-point-encryption-p2pe
article thumbnail

Just Published: P2PE v3.1

PCI perspectives

Today, the PCI SSC published a minor revision to the PCI Point-to-Point Encryption (P2PE) ®?Standard. We talk with Mike Thompson, Senior Manager of Emerging Standards and the Chair of the PCI Council’s P2PE Working Group, about some of these changes.

article thumbnail

Q&A on the Optional P2PE Solution Inventory Template

PCI perspectives

Point-to-Point Encryption (P2PE) technology makes data unreadable so it has no value to criminals even if stolen in a breach. PCI P2PE Solutions are those that have been validated as meeting the rigorous security requirements of the PCI P2PE Standard and are listed on the PCI Security Standards Council (PCI SSC) website.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Friday and Cyber Weekend: Navigating the Tumultuous Waters of Retail Cybersecurity

Thales Cloud Protection & Licensing

The Indispensable Role of End-to-End Encryption in the Age of Mobile Wallets Mobile wallets and online transactions are now as commonplace as physical cash transactions. Today, using Point-to-Point Encryption (P2PE) isn't just a luxury; it's a necessity. For retailers, this poses a two-pronged challenge.

Retail 83
article thumbnail

Is Your Chip Card Secure? Much Depends on Where You Bank

Krebs on Security

Newer, chip-based cards employ a technology known as EMV that encrypts the account data stored in the chip. The technology causes a unique encryption key — referred to as a token or “cryptogram” — to be generated each time the chip card interacts with a chip-capable payment terminal.

Banking 357
article thumbnail

Leveraging tokenization services from the major card brands

Thales Cloud Protection & Licensing

In the recent Thales eSecurity eBook, ‘ PCI Compliance and Data Protection for Dummies ’, we cover the main technologies that can be used, such as encryption and tokenization, to help with such efforts in protecting the payment prior to a successful authorization and secure storage of selected elements afterwards.

article thumbnail

Hardware security still essential at the heart of the payments infrastructure

Thales Cloud Protection & Licensing

Through the PCI documentation they have deemed that using software-based cryptography for all of these tasks could result in: Malware used to capture keys and sensitive data from server memory; Manipulation of PIN blocks in transit; and, The compromise of key-encrypting keys (used to secure cryptographic zones).

Mobile 66
article thumbnail

Request for Comments: P2PE v3.1 Draft Standard

PCI perspectives

P2PE Assessors and Participating Organizations are invited to provide feedback on the draft P2PE v3.1 Standard minor revision during a 30-day request for comments (RFC) period running from 18 May through 17 June 2021. Standard minor revision published in March 2021.