Risk

3/14/2018
01:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

PCI SSC Announces Changes to Qualified Integrators and Resellers Program

The changes are designed to improve payment data security and reduce merchants' risk.

WAKEFIELDMass., 14 March 2018 — Today the PCI Security Standards Council (PCI SSC) announced new changes to the PCI Qualified Integrators and Resellers (QIR) Program in response to industry feedback and data breach report findings. The program changes are designed to increase the number of QIRs and equip them to help merchants reduce risk by mitigating the leading causes of payment data breaches.

The PCI SSC QIR program offers specialized data security training and certification to individuals that install, configure and/or support payment systems. PCI SSC maintains a listing of PCI QIRs on its website for merchants to use in identifying and selecting trusted partners. Since the program was established in 2012, breach reports highlight that smaller merchants are increasingly under attack, and that the majority of merchant payment data breaches could be prevented by addressing three critical issues: insecure remote access, weak password practices and outdated and unpatched software.

“Based on industry feedback and data breach reports, we are evolving the QIR program to make it more accessible to integrators and resellers and to address the specific risk areas that are leading to the majority of merchant payment data breaches,” said PCI SSC Chief Operating Officer Mauro Lance. “The changes are designed to increase the number of trained integrators and resellers available to merchants, and to ensure that these integrators and resellers are trained specifically on how to thwart the three most common causes of data breaches.”

The updated QIR program will introduce new training course content on how to address insecure remote access, weak password practices and outdated and unpatched software during payment system installation. Additional changes are designed to make it easier for smaller integrators and resellers to become QIRs in order to increase the program’s reach to small businesses. These include reducing the cost of the program to $100 USD per person, making the QIR certification an individual certification, rather than a company one, and simplifying the QIR implementation statement.

“We are very pleased with the changes that the PCI SSC is making to the QIR program. The revised program will lead to more integrators and resellers being able to help merchants significantly reduce their payment security risk,” said John Kirk President and CEO of the Retail Solutions Providers Association (RSPA). “So many breaches are caused by entirely preventable attacks. With greater access to training, the PCI SSC is empowering smaller integrators and resellers to join the program which will greatly benefit the merchant community. We applaud the PCI SSC for listening to our industry and acting on our feedback.”

Interested applicants can register for the QIR program here. Merchants looking to hire a QIR can search the listing here. Learn more about the changes to the program by reading the PCI Perspectives blog post Q&A and QIR Program Changes FAQ.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3937
PUBLISHED: 2018-08-14
An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00. A specially crafted GET request can cause arbitrary commands to be executed. An attacker can send an HTTP request to trigger this vulnerability...
CVE-2018-3938
PUBLISHED: 2018-08-14
An exploitable stack-based buffer overflow vulnerability exists in the 802dot1xclientcert.cgi functionality of Sony IPELA E Series Camera G5 firmware 1.87.00. A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST r...
CVE-2018-12537
PUBLISHED: 2018-08-14
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
CVE-2018-12539
PUBLISHED: 2018-08-14
In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows,...
CVE-2018-3615
PUBLISHED: 2018-08-14
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.