Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:05 PM
Dark Reading
Dark Reading
Products and Releases

PCI SSC Announces Changes to Qualified Integrators and Resellers Program

The changes are designed to improve payment data security and reduce merchants' risk.

WAKEFIELDMass., 14 March 2018 — Today the PCI Security Standards Council (PCI SSC) announced new changes to the PCI Qualified Integrators and Resellers (QIR) Program in response to industry feedback and data breach report findings. The program changes are designed to increase the number of QIRs and equip them to help merchants reduce risk by mitigating the leading causes of payment data breaches.

The PCI SSC QIR program offers specialized data security training and certification to individuals that install, configure and/or support payment systems. PCI SSC maintains a listing of PCI QIRs on its website for merchants to use in identifying and selecting trusted partners. Since the program was established in 2012, breach reports highlight that smaller merchants are increasingly under attack, and that the majority of merchant payment data breaches could be prevented by addressing three critical issues: insecure remote access, weak password practices and outdated and unpatched software.

“Based on industry feedback and data breach reports, we are evolving the QIR program to make it more accessible to integrators and resellers and to address the specific risk areas that are leading to the majority of merchant payment data breaches,” said PCI SSC Chief Operating Officer Mauro Lance. “The changes are designed to increase the number of trained integrators and resellers available to merchants, and to ensure that these integrators and resellers are trained specifically on how to thwart the three most common causes of data breaches.”

The updated QIR program will introduce new training course content on how to address insecure remote access, weak password practices and outdated and unpatched software during payment system installation. Additional changes are designed to make it easier for smaller integrators and resellers to become QIRs in order to increase the program’s reach to small businesses. These include reducing the cost of the program to $100 USD per person, making the QIR certification an individual certification, rather than a company one, and simplifying the QIR implementation statement.

“We are very pleased with the changes that the PCI SSC is making to the QIR program. The revised program will lead to more integrators and resellers being able to help merchants significantly reduce their payment security risk,” said John Kirk President and CEO of the Retail Solutions Providers Association (RSPA). “So many breaches are caused by entirely preventable attacks. With greater access to training, the PCI SSC is empowering smaller integrators and resellers to join the program which will greatly benefit the merchant community. We applaud the PCI SSC for listening to our industry and acting on our feedback.”

Interested applicants can register for the QIR program here. Merchants looking to hire a QIR can search the listing here. Learn more about the changes to the program by reading the PCI Perspectives blog post Q&A and QIR Program Changes FAQ.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-09-21
On Supermicro H11, H12, M11, X9, X10, and X11 products, a combination of encryption and authentication problems in the virtual media service allows capture of BMC credentials and data transferred over virtual media devices. Attackers can use captured credentials to connect virtual USB devices to the...
PUBLISHED: 2019-09-21
On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the se...
PUBLISHED: 2019-09-20
The html-pdf package 2.2.0 for Node.js has an arbitrary file read vulnerability via an HTML file that uses XMLHttpRequest to access a file:/// URL.
PUBLISHED: 2019-09-20
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs ...
PUBLISHED: 2019-09-20
F5 BIG-IP 15.0.0, 14.1.0-, 14.0.0-, 13.0.0-, 12.1.0-, 11.6.0-11.6.4, and 11.5.1-11.5.9 and Enterprise Manager 3.1.1 may expose sensitive information and allow the system configuration to be modified when using non-default ConfigSync settings.