article thumbnail

Are Data Breaches the New Reality for Retail?

Thales Cloud Protection & Licensing

As digital transformation takes hold, the retail industry is under siege from cyber criminals and nation states attempting to steal consumers’ personal information, credit card data and banking information. senior retail IT security managers and 96 IT security managers from retailers across the globe.

Retail 66
article thumbnail

Retail has a multi-cloud problem…with sensitive data

Thales Cloud Protection & Licensing

Digital transformation (DX) is fundamentally impacting all aspects of the economy across every industry, and nowhere is this truer than in retail. Overall, 76% report that they will also use sensitive data within at least one of these cloud environments. Tools that reduce multi-cloud data security complexity are critical.

Retail 54
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. But it looks like my own personal data has been breached – again. But none of these reasons rose to the top in retail. Lack of perceived need” was the number one reason they didn’t deploy.

Retail 66
article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The Verizon DBIR 2020 report indicates that financially motivated attacks against retailers have moved away from Point of Sale (POS) devices and controllers, towards web applications. As the infrastructure changes, the adversaries change along with it to take the easiest path to data. Big Data and EMV 3DS.

Security 143
article thumbnail

IBM and TechD partner to securely share data and power insights with gen AI

IBM Big Data Hub

NeuralSeek prioritizes client security and privacy by encrypting data both in transit and at rest, safeguarding it from unauthorized access and preserving its confidentiality. Stringent access control mechanisms regulate data access based on user roles and permissions.

article thumbnail

Data privacy examples

IBM Big Data Hub

An online retailer always gets users’ explicit consent before sharing customer data with its partners. A navigation app anonymizes activity data before analyzing it for travel trends. The user can accept or reject each use of their data individually. The app heavily encrypts all user financial data.

article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

Digital transformation inherently drives organizations into a data driven world – and each technology used for digital transformation (cloud, big data, IoT, blockchain, mobile payments and more) requires its own unique approach to protecting data. Big Data – 99%. Encrypt the data.