We partnered up with VikingCloud, the largest global PCI compliance and security firm on 4 continents giving you the full context and info to implement PCI DSS 4.0.1. With a special focus on requirements 6.4.3 & 11.6.1.
Fill out the form below to be redirected to the recording.
"I use Stripe. Am I safe? "
"We are a Level 1 service provider providing JavaScript UIs. How can we protect against issues on the merchant's side , which we don't control?"
"Could we have suffered a client-side attack without knowing it? What if the breach happened months ago , and we've since made changes?"
"I'm a risk consultant. Should I raise this with IT and the C-suite? "
Many organizations are behind in adopting its changes, especially the requirements 6.4.3 & 11.6.1 which became effective in early 2025.
Even though SAQ A avoids most technical requirements, client-side attacks can still target payment pages, especially through iframes, redirects, or 3rd-party scripts.
Many SAQ A setups load 3rd-party scripts in user browsers. These scripts can be tampered with, so monitoring is essential, despite the "light" SAQ categorization.
You can be technically compliant but still vulnerable. The focus is shifting toward proactive threat detection and not just check-the-box approaches.
Organizations need a blend of technology + process + people to implement PCI 4.0.1 properly.