Content about Data security

September 10, 2014

The year 2013 was a wake-up call for retailers with regards to national data breaches, with frequency jumping 62% from 2012 to 2013. Eight chart-topping breaches exposed information totaling just over 10 million people last year, as opposed to one single breach of that size the year before.

By Jon May, Nuspire Networks

The year 2013 was a wake-up call for retailers with regards to national data breaches, with frequency jumping 62% from 2012 to 2013. Eight chart-topping breaches exposed information totaling just over 10 million people last year, as opposed to one single breach of that size the year before.

Statistics show the fall-out from a breach extend far beyond financial repercussions, (plan for $11k per affected customer per breach). Here are the scary statistics:

September 3, 2014

My experience in cyber security tells me that the retail sector probably represents the most fertile ground for cyber criminals.

By Chris Stoneff, Lieberman Software

My experience in cyber security tells me that the retail sector probably represents the most fertile ground for cyber criminals. That's because professional hackers understand that retail has never focused on IT security to the extent seen in other industries (like banks or payment processors) that handle customer payment card data.

July 15, 2014

Splunk Inc. announced that British retailer John Lewis is using Splunk Enterprise to deliver operational and customer insight across the retailer’s website.

San Francisco -- Splunk Inc. announced that British retailer John Lewis is using Splunk Enterprise to deliver operational and customer insight across the retailer’s website.

Originally selected to search and alert on John Lewis’ IT infrastructure, Splunk Enterprise is now also used for digital intelligence through real-time analysis of data from e-commerce platforms to better understand purchasing trends, improve customer experience and drive higher conversion rates.

June 10, 2014

Target Corp. has named Brad Maiorino as senior VP, chief information security officer, a new position added as the chain overhauls its security department in the wake of its data breach. Maiorino comes to Target from General Motors, where he was the company’s chief information security and information technology risk officer. Prior to that, he was the chief information security officer at General Electric.

Minneapolis — Target Corp. has named Brad Maiorino as senior VP, chief information security officer, a new position added as the chain overhauls its security department in the wake of its data breach.  Maiorino comes to Target from General Motors,  where he was the company’s chief information security and information technology risk officer.  Prior to that, he was the chief information security officer at General Electric.

May 5, 2014

It has been about five months since the Target data breach made the vulnerability of retail POS data a hot topic. Investigation has since shown the Target breach did not involve POS terminals.

It has been about five months since the Target data breach made the vulnerability of retail POS data a hot topic. Investigation has since shown the Target breach did not involve POS terminals. However, high-profile thefts of customer payment card data from Target and other retailers including Neiman Marcus, Michaels and Sally Beauty Supply have highlighted the need for U.S. retailers to adopt the global Europass, MasterCard and Visa (EMV) standard for accepting payments from cards that store consumer information on secure embedded microchips, rather than on magnetic stripes.

April 29, 2014

Consumers avoid doing business with a breached organization at a high rate.

San Francisco - Consumers avoid doing business with a breached organization at a high rate. According to a new study conducted by Javelin Strategy & Research and commissioned by data management solution provider, Identity Finder, 33% of customers will shop elsewhere if their retailer of choice is breached.

April 18, 2014

If retailers want to address credit card breaches head-on, then they need to join the leaders already taking their systems off the radar of advanced malware based attacks — especially any retailer that's seen repeated attacks, which illustrate that traditional IT defenses simply don't cut the mustard.

By Mark Bower, Voltage Security

January 30, 2014

Target reportedly said a data breach at an unidentified vendor led to hackers obtaining phony credentials that allowed them to gain access to Target’s systems and steal the information for 40 million credit and debit cards, as well as the personal data of about 70 million consumers.

Minneapolis – Target reportedly said a data breach at an unidentified vendor led to hackers obtaining phony credentials that allowed them to gain access to Target’s systems and steal the information for 40 million credit and debit cards, as well as the personal data of about 70 million consumers. According to the Associated Press, Target did not offer any specific details on who the vendor was or how hackers obtained the credentials.

January 27, 2014

Secure data vault provider CertainStore is rolling out of a cybersecurity solution utilizing its proprietary micro-encryption/micro-tokenization technology to prevent the re-occurrence of recent malicious attacks on customer data.

Colorado Springs, Colo. – Secure data vault provider CertainStore is rolling out of a cybersecurity solution utilizing its proprietary micro-encryption/micro-tokenization technology to prevent the re-occurrence of recent malicious attacks on customer data.

January 21, 2014

Target Corp. continues to take steps in response to the holiday data breach that may have exposed the personal and financial data of up to 110 million consumers to hackers.

Minneapolis – Target Corp. continues to take steps in response to the holiday data breach that may have exposed the personal and financial data of up to 110 million consumers to hackers. The Wall Street Journal reports that Target shut down remote access to two internal sites in the aftermath of the massive attack.

January 15, 2014

Yet again, the attackers have gained access to sensitive data. The industry has to understand that incomplete approaches to protecting data that leave it exposed at some vulnerable point in its life will result in a breach. It's merely a matter of time.

By Mark Bower, VP, Voltage Security

February 21, 2013

Managing and classifying enterprise data is the number one security and privacy area in need of improvement, and remains a major challenge for IT departments, according to a survey about IT risk factors for 2013 published by global consulting firm Protiviti.

Menlo Park, Calif. -- Managing and classifying enterprise data is the number one security and privacy area in need of improvement, and remains a major challenge for IT departments, according to a survey about IT risk factors for 2013 published by global consulting firm Protiviti.

The 2013 IT Priorities Survey found that IT executives are struggling to manage the wide variety of technology risk, regulatory compliance and performance challenges that now face them.

November 23, 2011

By Todd Feinman, Identity Finder

By Todd Feinman, CEO of Identity Finder

October 12, 2011

Research released Wednesday by PwC found that retail and consumer executives are spending less on security due to insufficient capital, but that they maintain confidence in their information security, despite an increase in security incidents.

New York City -- Research released Wednesday by PwC found that retail and consumer executives are spending less on security due to insufficient capital, but that they maintain confidence in their information security, despite an increase in security incidents.

August 22, 2011

While retailers continue to beef up computer security, hackers continue to find ways to circumvent even the most sophisticated cyber-blockades. And the threat is not only hackers or rogue employees maliciously liberating private information: Data breaches occur when sensitive information is improperly disposed of and tossed in the trash or lost when a laptop or other portable electronic device is mislaid by or stolen from a well-meaning employee. This not only impacts your customers but can damage a company’s reputation and bottom line.


January 13, 2011

An overwhelming majority (86%) of small-business respondents (86%) say that keeping their customer card information secure and feel payment-card data security is important to their business.

New York City -- An overwhelming majority (86%) of small-business respondents (86%) say that keeping their customer card information secure and feel payment-card data security is important to their business. But 60% are unaware of the costs they could incur in the event of a breach. Those are among the results of a research study of data security and fraud-prevention strategies practiced at small- to mid-sized retailers. The study is from the National Retail Federation and First Data Corp.

October 31, 2010

Specialty apparel retailer Express found itself in a technology quandary in 2007 when it...

November 30, 2008

Executives at Staples recently received an e-mail alerting them that consumer credit-card data had...

March 17, 2008

Hannaford Bros. grocery chain announced late Monday it has experienced a security breach that has...

December 31, 2007

The race is on between companies that secure retail networks and hackers who compromise...

August 31, 2007

As more clients use credit and loyalty cards during their salon visits, Regis Salons...

August 30, 2007

As more clients use credit and loyalty cards during their salon visits, Regis Salons is...

June 30, 2007

Continuing the effort to bring the safeguarding of customer data to the forefront of retailers’...

April 30, 2007

Alot has been written about the TJX Cos. Inc.’s data breach since it was first...

March 31, 2007

Data is the...