NL +31 (0)20 4232420 / SP +34 937 379 542 info@fortytwo.nl
Requirement 5 of PCI DSS explained

Requirement 5 of PCI DSS explained

This blog is part of a blog series on the 12 PCI DSS Requirements. We discuss the common challenges and explain what kind of evidence is needed to comply with the requirement. Requirement 5: Protect all systems against all type of malware This requirement focuses on...
Requirement 4 of PCI DSS explained

Requirement 4 of PCI DSS explained

This blog is part of a blog series on the 12 PCI DSS Requirements. We discuss the common challenges and explain what kind of evidence is needed to comply with the requirement. ‘Encrypt transmission of CHD across open, public networks’ Malicious individuals...
Understanding Requirement 3 of PCI DSS

Understanding Requirement 3 of PCI DSS

This blog is part of a blog series on the 12 PCI DSS Requirements. We discuss the common challenges and explain what kind of evidence is needed to comply with the requirement.  Protect Cardholder DataUp to now, we have seen how to determine the scope of PCI DSS and...