WHITE PAPER:
Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III
EZINE:
April ezine: Rebalancing margins. It's time for vendors to reconsider reward models to reflect the changes in the ways partners generate their revenues
WEBCAST:
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
DATA SHEET:
Access this concise resource to uncover the key features of a data masking tool, to ensure the security of your organization's reputation and confidential information.
WHITE PAPER:
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.
WHITE PAPER:
Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.
RESEARCH CONTENT:
Learn where future investment in payment technologies will be required, and get insight into the state of consumer payments in Australia, with findings on payment method trends and changes in consumer spending behaviour. Learn about consumer attitudes toward payment methods, and the likely effect on the future of the payments system. And much more!
EGUIDE:
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.