article thumbnail

News alert: Harter Secrest & Emery announces designation as NetDiligence-authorized Breach Coac

The Last Watchdog

Harter Secrest & Emery’s privacy and data security clients range from Fortune 100 corporations to closely-held businesses in a wide range of industries, including healthcare, financial services, data analytics/big data, retail, education, manufacturers, defense contractors, and employers of all sizes.

article thumbnail

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. What I’d originally planned to write about was a topic that directly applies – why retailers of all stripes are not investing in data security. But none of these reasons rose to the top in retail.

Retail 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to achieve high-impact personalization at scale with managed marketing services

IBM Big Data Hub

What are managed marketing services (MMS)? Managed marketing services are the outsourcing of marketing business processes, such as campaign planning and execution, content management and enhancement, marketing analytics and other marketing support (SEO, social listening and loyalty). Did that action turn into a lead?

article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The Verizon DBIR 2020 report indicates that financially motivated attacks against retailers have moved away from Point of Sale (POS) devices and controllers, towards web applications. Figure 1: Web application breaches in the Retail industry. Fraud and scams move to the web. Source: Verizon DBIR 2020.

Security 143
article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.

article thumbnail

SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

The Last Watchdog

To counter the automation of criminal botnets, Cequence ingests this network traffic data into a powerful analytics engine to determine if a malicious bot attack is taking place, Keil says.

article thumbnail

Automated governance and trustworthy AI

IBM Big Data Hub

Firms in regulated industries such as financial services, healthcare and telecom will see additional regulations being enforced to ensure AI governance compliance with requirements to document the evidence of it. Case study: IBM Cloud Pak for Data at work in a large financial services firm.