Close Menu
Alpha Leaders
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
What's On
Oil market chaos to deepen as more Gulf giants cut output

Oil market chaos to deepen as more Gulf giants cut output

8 March 2026
Trump said ‘economy is roaring’ but jobs evaporated, gas prices soared, and stocks plunged

Trump said ‘economy is roaring’ but jobs evaporated, gas prices soared, and stocks plunged

8 March 2026
From thyroid cancer to 40‑hour fasts: Inside Daymond John’s biohacking routine

From thyroid cancer to 40‑hour fasts: Inside Daymond John’s biohacking routine

8 March 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Alpha Leaders
newsletter
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
Alpha Leaders
Home » Preparing For New Payment Data Security Standards
Innovation

Preparing For New Payment Data Security Standards

Press RoomBy Press Room4 March 20245 Mins Read
Facebook Twitter Copy Link Pinterest LinkedIn Tumblr Email WhatsApp
Preparing For New Payment Data Security Standards

Vince Berk is the Chief Strategist at Quantum Xchange, a post-quantum crypto-agility provider. Ph.D. in AI/ML, founder of FlowTraq.

The Payment Card Industry Data Security Standard (PCI DSS) v. 3.2.1 is officially retired as of March 31, 2024, giving way to PCI DSS v. 4.0, with full implementation mandated by March 2025.

An August 2023 S&P Global study found that few organizations have a solid understanding of all PCI DSS 4.0 requirements, and many say they haven’t even begun to execute the pending changes.

At the bare minimum, taking an annual cryptographic inventory for in-scope systems is a new and absolutely minimal bar to pass. This means doing a review and analysis of the cryptography in use at a given point in time so that any deficiencies, such as outdated or outright lack of cryptography, may be remediated.

That said, there are risk factors associated with that statement.

• Timeslice. Systems are often configured to handle a wide range of cryptographic options. At the time of session establishment, the cryptography is negotiated based on what both the server and client are willing to do. Short-time-duration sampling will likely miss situations where cryptography is “downgraded” below minimum standards.

• Scope. Scope is difficult to define, but this is not new to the concept of PCI and the data security standards community. The knock-on effects of compromised administrative accounts, reuse of passwords or compromised networking gear all might fall “out of scope” by the definition of the standard, but they have a clear and imminent risk to the “in-scope” systems.

• Sampling. Many current service providers take a sampled approach to demonstrate that certain compliance controls have been met. A sample certainly suffices when validating that a response process is in place, for example. For cryptography and things like password strength, however, a sampling is insufficient. For cryptography, just like passwords, the same risk applies—if you prove one password is strong, that doesn’t mean all of them are!

• Legacy. Systems that have been operational since the beginning of time are usually still in operation because they “just work.” Despite software updates often being available (but frequently not applied), the configurations generally permit old and outdated cryptography. This leaves the risk that very outdated cryptography is no longer the default but is still available as an option on the system.

This does not present itself for the majority of communications, but for old, outdated or malicious interactions, it is sometimes used and, therefore, rarely caught. This problem affects even legacy systems that have been kept up to date, as configurations are generally not reviewed after updates.

• Ignorance. Possibly the worst risk of all, cryptography is typically taken for granted. It is just there, and if it looks scrambled, then it is encrypted. However, there is a world of difference between good encryption and insufficient encryption.

When cryptographic risk must be evaluated, many operators are not familiar with the inherent risk they are dealing with. Common issues include weak ciphers, long-duration certificates and self-signed certificates. Operators understand weak intermediary certificates even less, but they are a natural entry point for skilled hackers as well as malicious insiders.

Then, there are the ever-present software bugs. There are many out-of-date cryptography libraries with bugs that allow man-in-the-middle attacks or outright guessing of the encryption keys. None of this is obvious to the casual observer.

In addition to beginning with a cryptographic inventory, there are other steps CISOs can take to prepare themselves for the new PCI DSS standards.

• Continuous monitoring instead of an annual inventory. When remediation of cryptographic deficiencies is made a standard and ongoing process, you are likely to raise the bar in an ongoing manner. This gives the additional benefit that you might catch a smart threat actor that acts differently than your sanctioned systems.

• Set cryptographic hygiene standards. An inventory of “in-scope” systems is intended to point out deficiencies for remediation—but remediate to what? Setting a policy of minimum standards of cryptographic strength and hygiene, as well as a process for achieving those standards, can help the entire enterprise avoid many of the second-order risks mentioned above.

Enterprises are governed by policy and process, and being explicit about certificate expiration durations, access control to certificates, minimum cryptographic standards and software library versions can significantly increase security in the overall enterprise.

• Move to crypto-agility. Cryptographic inventory is only the beginning. With much cryptography baked into software packages, the ability to transition to new or even quantum-safe cryptography is going to be a cumbersome and arduous process. Take this newfound visibility as the first step toward an agile position with cryptography—such that the next version of the standard, which is most definitely going to include post-quantum cryptographic requirements, becomes achievable.

Regardless, keep in mind that compliance with regulation is a baseline. A new standard gives you an opportunity to not only meet the minimum but also to evaluate what approach you can take to ensure safer, more secure data communication.

Remember, the fire code specifies a minimum standard that aims to avoid the worst fire risks, but by no means do these standards guarantee you are safe from fires.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Vincent Berk
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link

Related Articles

Venture Capital Is Discovering Fashion Tech

7 March 2026

Will The Iran Conflict Reshape Venture Capital?

7 March 2026

Founder Accused By His Own Startup Of Forgery, Secret Deals And Luxury Spending

6 March 2026

When Claude Paused: An AI Doomsday Preview And The Question Of Human Survival

3 March 2026

Data Plateau: Hit The Scaling Wall With AI Or Remain An Innovator?

3 March 2026
New Leak Signals Unprecedented Design Change

New Leak Signals Unprecedented Design Change

1 March 2026
Don't Miss
Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

By Press Room27 December 2024

Every year, millions of people unwrap Christmas gifts that they do not love, need, or…

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

30 December 2024
Moltbook is the talk of Silicon Valley. But the furor is eerily reminiscent of a 2017 Facebook research experiment

Moltbook is the talk of Silicon Valley. But the furor is eerily reminiscent of a 2017 Facebook research experiment

6 February 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Latest Articles
Bidding for a Taylor Swift ticket or to cut the line at DisneyWorld? Maybe you’re in a ‘hidden market’

Bidding for a Taylor Swift ticket or to cut the line at DisneyWorld? Maybe you’re in a ‘hidden market’

8 March 20261 Views
Asana CEO Dan Rogers says getting a job in Silicon Valley isn’t harder for Gen Z than it was for him

Asana CEO Dan Rogers says getting a job in Silicon Valley isn’t harder for Gen Z than it was for him

8 March 20261 Views
This AI founder who quit her 9-to-5 law job has a warning for anyone dreaming of doing the same: ‘I’m working harder now than I ever did’

This AI founder who quit her 9-to-5 law job has a warning for anyone dreaming of doing the same: ‘I’m working harder now than I ever did’

8 March 20261 Views
Best protection for ships sailing through Strait of Hormuz may be claiming to be a ‘Chinese’ vessel

Best protection for ships sailing through Strait of Hormuz may be claiming to be a ‘Chinese’ vessel

8 March 20262 Views
About Us
About Us

Alpha Leaders is your one-stop website for the latest Entrepreneurs and Leaders news and updates, follow us now to get the news that matters to you.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks
Oil market chaos to deepen as more Gulf giants cut output

Oil market chaos to deepen as more Gulf giants cut output

8 March 2026
Trump said ‘economy is roaring’ but jobs evaporated, gas prices soared, and stocks plunged

Trump said ‘economy is roaring’ but jobs evaporated, gas prices soared, and stocks plunged

8 March 2026
From thyroid cancer to 40‑hour fasts: Inside Daymond John’s biohacking routine

From thyroid cancer to 40‑hour fasts: Inside Daymond John’s biohacking routine

8 March 2026
Most Popular
AI will hurt the economy before it helps it. Here’s what comes after, according to Joseph Stieglitz

AI will hurt the economy before it helps it. Here’s what comes after, according to Joseph Stieglitz

8 March 20261 Views
Bidding for a Taylor Swift ticket or to cut the line at DisneyWorld? Maybe you’re in a ‘hidden market’

Bidding for a Taylor Swift ticket or to cut the line at DisneyWorld? Maybe you’re in a ‘hidden market’

8 March 20261 Views
Asana CEO Dan Rogers says getting a job in Silicon Valley isn’t harder for Gen Z than it was for him

Asana CEO Dan Rogers says getting a job in Silicon Valley isn’t harder for Gen Z than it was for him

8 March 20261 Views
© 2026 Alpha Leaders. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.