Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Target Making $100 Million Push Toward Chip-Enabled Smart Cards

Chip-Enabled Smart Card

Chip-Enabled Smart Card

In his testimony before the Senate Committee on the Judiciary in Washington, D.C., Target Corp. Chief Financial Officer John Mulligan, said on Tuesday that the company would accelerate its implementation of smart card technology in an effort to reduce credit and debit card fraud stemming from customers shopping in its stores.

Mulligan discussed the company’s response to the recent massive data breach, and shared some of the efforts by the company to protect its customers and support industry initiatives to strengthen data security.

During his testimony, Mulligan said Target will equip its own “REDcards” and all of its store card readers in the U.S. with chip-enabled smart-card technology by the first quarter of 2015, more than six months ahead of previous plans. The accelerated timing is part of a $100 million effort to put in place chip-enabled technology in all of Target’s nearly 1,800 U.S. stores, the company said.

Following a proposal by MasterCard in May 2012 to form a cross-industry group to help drive the adoption of EMV technology in the United States, the Smart Card Alliance formed an independent, cross-industry organization in August 2012 called the EMV Migration Forum.

Target said that it became a founding and steering committee member of the EMV Migration Forum in 2012.

“EMV” technology—the name coming from its original creators Europay, MasterCard, and Visa—uses an embedded microchip and a personal identification number (PIN) to validate the card, its owner, and authorize payment transactions instead of a cardholder’s signature.

Popular in Europe, cards using EMV chip technology help reduce card fraud resulting from counterfeit, lost and stolen cards. Additionally, the technology can enable transactions across contactless, mobile, and remote payment channels. With EMV technology equipped payment cards, even if a card number is stolen in a data breach, cybercriminals cannot counterfeit the card.

Migration to EMV Inevitable But Expensive

Advertisement. Scroll to continue reading.

Back in February 2011, former SecurityWeek columnist Christopher Justice commented on how 50-year-old plus magnetic stripe technology enables criminals to skim information directly from the cards with simple card reading devices or recreate payment cards using stolen payment card data.

“The migration will be neither fast nor inexpensive, requiring a hefty investment in new technology and new processes,” Justice wrote in a SecurityWeek column at the time. “Both merchants and consumers will need to continue to build a compelling business case for migration to chip and PIN cards in order to convince issuers and acquirers to change the payment infrastructure that is currently in place.”

However, the migration to EMV in the U.S. is inevitable, Justice said. “We can anticipate that there will continue to be a strong push to migrate to a new chip and PIN payment architecture in the United States, fueled by multi-national merchants who have seen fraud/chargeback benefits from implementations in other parts of the world.”

The recent breaches at Target, Nieman Marcus, Michaels Stores and White Lodging have built an incredible case to fuel the adoption of EMV technology in the US.

“Updating payment card technology and strengthening protections for American consumers is a shared responsibility and requires a collective and coordinated response. On behalf of Target, I am committing that we will be an active part of that solution,” Mulligan said in his testimony.  

Related Reading: Will the U.S. be Able to Fend Off the EMV Card Standard Invasion?

Related ReadingBank of America Starts Rollout of Chip Credit Cards to Consumers

Related ReadingBank of America to Offer EMV Technology to Corporate Customers

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem