Analysis: Fat Face's Awkward Breach Notification

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of retailer Fat Face’s awkward "strictly private and confidential" data breach notification.

Retail 163

Analysis: Why Regulators Got Tough With H&M

Data Breach Today

The latest edition of the ISMG Security Report analyzes why clothing retailer H&M was hit with a hefty fine for violating the EU's General Data Protection Rule.

Retail 217
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hunton Publishes 2020 Retail Industry Year in Review

Hunton Privacy

This is an extraordinary and unprecedented time for the retail industry. Hunton Andrews Kurth’s 2020 Retail Industry Year in Review provides an in-depth analysis of the issues and challenges that retailers faced in the past year, and a look ahead at what they can expect in 2021.

Optimizing Analytics in Retail with Geospatial Data

Perficient Data & Analytics

With the abundance of location data generated from smart phones and connected devices, the potential of geospatial data has expanded dramatically, especially in the retail industry. At a basic level, geospatial data better enables retail organizations to focus marketing and promotions at target customers. Which of our retail outlets are accessible for these customers? Interactive maps with linked reporting are provided to visualize retail proximity analysis.

#ModernDataMasters: Martin Squires, The Analysis Foundry

Reltio

Just like in the TV programmes like CSI where the analysts solve crimes by a combination of analysis and field work, there is no better way of understanding what is going on than going into the real-world for example visiting shops or listening into call-centre conversations. You might be asked a question but you learn over the years to drill into a bit more because a request for a “simple” piece of analysis is very often not straightforward. Kate Tickner, Reltio.

Retail has a multi-cloud problem…with sensitive data

Thales Cloud Protection & Licensing

Digital transformation (DX) is fundamentally impacting all aspects of the economy across every industry, and nowhere is this truer than in retail. DX technologies such as cloud, mobile payments, IoT, Big Data and others have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also in how they communicate with, serve, and support them. For more key findings, download the 2019 Thales Data Threat Report- Retail Edition.

MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

The Last Watchdog

This requires full stream reassembly for content analysis, and then real time transaction analysis, all at speeds of millions of transactions per second.”. By really understanding these relationships, and what represents privileged access and what represents control, we’re able to do much more sophisticated analysis.”.

Data: E-Retail Hacks More Lucrative Than Ever

Krebs on Security

Traditionally, the average price for card data nabbed from online retailers — referred to in the underground as “ CVVs ” — has ranged somewhere between $2 and $8 per account. In contrast, the value of “ dumps ” — hacker slang for card data swiped from compromised retail stores, hotels and restaurants with the help of malware installed on point-of-sale systems — has long hovered around $15-$20 per card.

Retail 149

‘People are strange, when you’re a stranger’: A retail bank view into artificial intelligence

CGI

‘People are strange, when you’re a stranger’: A retail bank view into artificial intelligence. For the past five years, CGI has surveyed retail bank customers to identify what they want from banks, how they view alternative providers, and opportunities for further bank investment to provide banks with a view into the year ahead. pooja.cs@cgi.com. Wed, 09/04/2019 - 00:02.

Digital Transformation Examples: Three Industries Dominating Digital Transformation

erwin

Digital Transformation in Retail. The inherently competitive nature of retail has made the sector a leader in adopting data-driven strategy. From loyalty cards to targeted online ads, retail has always had to adapt to stay relevant. Four main areas in retail demonstrate digital transformation, with a healthy data governance initiative driving them all. This article further explores digital transformation and data governance in retail.

Point-of-Sale (POS) Security Measures for 2021

eSecurity Planet

It’s a tough time to be a retailer. “Based on the analysis of the available data, the entire network of Lord & Taylor and 83 Saks Fifth Avenue locations have been compromised,” the firm wrote in a blog post examining the breach.

Sales 52

Manage IMS performance spikes

Rocket Software

For retail, this could lead to lost sales, as a customer has choices from whom they buy. Using IMS PA and the Deadlock report, administrators get a comprehensive analysis of deadlock events. Buffer analysis. “Why is it taking so much time?”

Sales 82

TA505 Crime Gang Debuts Brand-New ServHelper Backdoor

Threatpost

The latest malware from TA505 has been seen targeting banks, retailers and restaurants with two different versions. Malware banks crime gang downloader email campaigns flawedgrace Malware analysis RAT remote desktop servhelper ta505 tunnel

Digital Transformation in Municipal Government: The Hidden Force Powering Smart Cities

erwin

If you shop at a retailer that doesn’t deliver a modern, personalized experience, thousands more retailers are just a click away. The smart cities movement refers to the broad effort of municipal governments to incorporate sensors, data collection and analysis to improve responses to everything from rush-hour traffic to air quality to crime prevention. Smart cities are changing the world.

PCI SSC warns organisations about growing threat of online skimming

IT Governance

The alert, issued in partnership with the Retail & Hospitality ISAC (information sharing and analysis centre [link] ), highlights a recent increase in malware attacks targeting e-commerce websites to gain payment card data. The PCI SSC and the Retail & Hospitality ISAC highlight the threat of: Plugin vulnerabilities; Brute-force login attempts (aka credential stuffing); Phishing scams and other social engineering techniques; and. PCI DSS Retail

Keeping customer data secure during the festive season

IT Governance

Although the ONS (Office for National Statistics) reported that retail sales fell to a six-month low in October because of reduced levels of disposable income, Black Friday is predicted to create a £10 billion shopping spree in the UK that will continue until Christmas Eve. We are now in the “golden quarter”, the period that has traditionally ‘made’ the retail year. Cyber Security Data Protection PCI DSS Retail data breach payment card data payment data protection shopping

Sales 40

New Areas Ripe for Exploitation in 2018

Data Breach Today

Also featured: an analysis of the recent news of the Meltdown and Spectre microprocessor flaws and the POS malware attack on retailer Forever 21 Dave DeWalt, former CEO of McAfee and FireEye, identifies the next generation of cybersecurity threats in the latest edition of the ISMG Security Report.

Retail 112

FRANCE: New cooperation agreement between the CNIL and DGCCRF

DLA Piper Privacy Matters

Share their analysis in the evolution of the legal and regulatory consumer and data protection framework. But have no fear: although it is usually seen as a burden and as putting a brake on business and innovation, compliance with GDPR can in fact be a powerful tool to ensure confidence and increase competitiveness, as we explain in our article for Law A La Mode (published last November and which covers different trends in the retail sectors in relation to GDPR).

B2C 40

#ModernDataMasters: Mike Evans, Chief Technology Officer

Reltio

Mike Evans is CTO and Founder at Comma Group and has spent more than a decade in the business analysis, MDM and data management space. As an aspiring Project Manager, I was asked to work on an analysis project to understand why some recent initiatives weren’t achieving expected results. For example, twenty or even ten years ago in food retail, focus on item cost was important, a description of the item and not much beyond that! Kate Tickner, Reltio.

MDM 63

Credit card gambling ban: government to meet banks and bookies

IT Governance

Find out more about our Gambling Commission Security Audit – Gap Analysis service >> As a PCI QSA (Qualified Security Assessor) company, we can also help operators that process payment cards to comply with the PCI DSS. ISO 27001 PCI DSS Retail Compliance Gambling Gambling Commission Online gambling Remote Technical Standards

Worldwide Capture Software Market grows 16.5%

Document Imaging Report

Geneva, Switzerland – October 6, 2020 – Infosource, the leading analyst firm covering the Capture Software market, reported that analysis of its annual Worldwide Market Survey showed that the market for Capture Software experienced double-digit growth for the fourth year in a row. Case Management applications are in demand in top vertical markets including: Government, Retail Banking, and Healthcare. Press Releases Capture Market AnalysisCapture 2.0

A Digital Transformation Lesson: Open Source Business Models

Bill Schmarzo - Dell EMC

Business Models and Value Chain Analysis. Let’s call upon another old-school friend of the Big Data MBA community – Michael Porter – to understand how his Value Chain Analysis technique can help guide our business model and digital transformation discussion. In my original Strata presentation back in 2012, I shared with the audience how they could use Michael Porter’s classic (Old School) Value Chain Analysis technique to identify where and how to apply big data analytics.

7 Reasons Why Businesses Should Adopt A Modern MDM Platform

Reltio

A top used car retailer consolidated data from 155+ store systems in less than 15 weeks to drive omnichannel customer experience. The Customer and Vehicle Master helped the client’s marketing team execute better targeted campaigns and allowed the merchandising department refine inventory acquisition targets based on more complex demand analysis. A leading pet specialty retailer leveraged data to tackle Amazon Effect and transform into a customer-centric service company.

MDM 52

Gambling trade bodies are creating a powerful lobbying group amid strengthening regulations

IT Governance

Find out more about our Gambling Commission Security Audit – Gap Analysis service >> As a PCI QSA (Qualified Security Assessor) company, we can also help operators that process payment cards to comply with the PCI DSS. ISO 27001 PCI DSS Retail Fixed odds betting terminals FOBTs Gambling Gambling Commission

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

Think about how Amazon’s market capitalization towers above that of other retailers, or how the iPhone regularly captures over 90 percent of smartphone industry profits.) See the blog “ Big Data MBA: Course 101A – Unit III ” for a quick refresher on Michael Porter Value Chain Analysis process. Big Data AI artificial intelligence Big Data MBA customer experience Customer Journey Digital Transformation CX Data Science Digital Economics Minimum Viable Products Value Chain Analysis

FIN7 group leverages Windows 11 Alpha-Themed docs to drop Javascript payloads

Security Affairs

As a California-based provider of POS technology for the retail and hospitality sector, a successful infection would allow the group to obtain payment card data and later sell the information on online marketplaces.” ” reads the analysis published by Anomali.

COVID-19 ‘Breach Bubble’ Waiting to Pop?

Krebs on Security

Global lockdowns from COVID-19 have resulted in far fewer fraudsters willing or able to visit retail stores to use their counterfeit cards, and the decreased demand has severely depressed prices in the underground for purloined card data.

Sales 204

Report Shows Major Security Holes in Banking Apps

Adam Levin

A security analysis of 30 major banking and financial apps has shown major security holes and a lax approach to protecting user data. The analysis was conducted by the Aite Group, which looked at mobile apps in eight categories: retail banking, credit cards, mobile payment, healthcare savings, retail finance, health insurance, auto insurance and cryptocurrency.

A Digital Transformation Lesson: Open Source Business Models

Bill Schmarzo - Dell EMC

Business Models and Value Chain Analysis. Let’s call upon another old-school friend of the Big Data MBA community – Michael Porter – to understand how his Value Chain Analysis technique can help guide our business model and digital transformation discussion. In my original Strata presentation back in 2012, I shared with the audience how they could use Michael Porter’s classic (Old School) Value Chain Analysis technique to identify where and how to apply big data analytics.

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

Cybersecurity experts say the raid included the charging of a major carding kingpin thought to be tied to dozens of carding shops and to some of the bigger data breaches targeting western retailers over the past decade.

Retail 206

Breach at Dickey’s BBQ Smokes 3M Cards

Krebs on Security

In July, KrebsOnSecurity wrote about an analysis by researchers at New York University , which looked at patterns surrounding more than 19 million stolen payment cards that were exposed after the hacking of BriansClub, a top competitor to the Joker’s Stash carding shop.

Sales 248

Grayfly APT uses recently discovered Sidewalk backdoor

Security Affairs

In late August, ESET researchers uncovered the SideWalk backdoor that was employed by the Chine cyberespionage group in an attack aimed at a computer retail company based in the U.S. ” reads the analysis published by Broadcom’s Symantec. ” continues the analysis.

QakBot Big Game Hunting continues: the operators drop ProLock ransomware for Egregor

Security Affairs

This ransomware strain emerged in September 2020, but the threat actors behind already managed to lock quite big companies, such as game developers Crytek, booksellers Barnes & Noble, and most recently a retail giant Cencosud from Chile. of victims) and Retail (14.5%).

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

Think about how Amazon’s market capitalization towers above that of other retailers, or how the iPhone regularly captures over 90 percent of smartphone industry profits.) See the blog “ Big Data MBA: Course 101A – Unit III ” for a quick refresher on Michael Porter Value Chain Analysis process. Digital Transformation is becoming a business mandate.

Wawa Breach May Have Compromised More Than 30 Million Payment Cards

Krebs on Security

“Based on Gemini’s analysis, the initial set of bases linked to “BIGBADABOOM-III” consisted of nearly 100,000 records,” Gemini observed. In late December 2019, fuel and convenience store chain Wawa Inc.

Sales 218

Global Scamdemic: Scams Become Number One Online Crime

Security Affairs

Threat hunting and adversarial cyber intelligence company Group-IB published a comprehensive analysis of fraud cases on a global scale. In 2020, a multi-stage scam called Rabbit Hole targeted companies’ brands, primarily retail and online services.

Sale of 4 Million Stolen Cards Tied to Breaches at 4 Restaurant Chains

Krebs on Security

“Gemini found that the four breached restaurants, ranked from most to least affected, were Krystal, Moe’s, McAlister’s and Schlotzsky’s,” Gemini wrote in an analysis of the New World Order batch shared with this author. On Nov.

Sales 210

Russian TA505 threat actor target financial entities worldwide

Security Affairs

“CyberInt researchers have been tracking various activities following the spear-phishing campaign targeting large US-based retailers detected in December 2018.” ” reads the analysis published by Cyberint. ” The TA505 group was first spotted by Proofpoint back 2017, it has been active at least since 2015 and targets organizations in financial and retail industries. ” continues the analysis published by Cyberint.

California Department of Business Oversight December 2019 Actions

Data Matters

The CDBO’s actions, however, may require companies to revisit that analysis and consider their licensing obligations. How consumers choose to pay for retail products continues to rapidly evolve with changing technology. This “retail installment sale” structure generally results in fewer state licensing obligations. The California Department of Business Oversight (CDBO) recently concluded that the point of sale consumer financing programs offered by Sezzle, Inc.,

Sales 60

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

One security expert at a PCM customer who was recently notified about the incident said the intruders appeared primarily interested in stealing information that could be used to conduct gift card fraud at various retailers and financial institutions. Earlier this week, cyber intelligence firm RiskIQ published a lengthy analysis of the hacking group that targeted Wipro, among many other companies. A digital intrusion at PCM Inc. , a major U.S.-based

Cloud 163