Remove Government Remove Mining Remove Retail Remove Security

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. In this case, it looks as though the attackers had been on the Starwood network for somewhere around three years, mining out their reservations database (keep in mind that Marriott only acquired Starwood in 2016 ). What I’d originally planned to write about was a topic that directly applies – why retailers of all stripes are not investing in data security.

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Third-party governance. IT governance and security. Privacy governance and management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Steelcase office furniture giant hit by Ryuk ransomware attack

Security Affairs

Steelcase is a US-based furniture company that produces office furniture, architectural and technology products for office environments and the education, health care and retail industries.

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

Ethical data management means you need data governance and data security by design – these initiatives are hard to retrofit. In the past organisations often mobilized for large MDM programmes and had to retrospectively drive the governance throughout – now we are seeing that data governance is often leading – it has become a non-negotiable.”. Kate Tickner, Reltio.

MDM 40

Top GRC Tools & Software for 2021

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Third-party governance. IT governance and security. Privacy governance and management.

How to Take Your Business to The Next Level with Data Intelligence

erwin

With tools such as Artificial Intelligence, Machine Learning, and Data Mining, businesses and organizations can collate and analyze large amounts of data reliably and more efficiently. Retail. Blockchain enables more secure and complex transaction record-keeping for businesses.

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

With more than 65,000 employees in 56 countries, Thales is a global leader in technology solutions for the aerospace, transport, defence and security markets. Its unique capabilities include the design and deployment of equipment, systems and services to meet complex security requirements. Amy Saunders spoke with Nick Jovanovic, VP Federal of Thales eSecurity Federal (a division of Thales Defense & Security, Inc.), What steps need to be taken to ensure data security?

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI

CGI

For utilities, these are green field areas, and clients frequently ask me how CGI provides data support to more advanced industries like retail banking and telecoms. There is an equally strong focus on optimizing operations, for both retailers grappling with shrinking margins and grid operators urged to “sweat” their assets. For robotic process automation (RPA), utilities are trailing 20 percentage points behind retail banking for the stages of “implementing” or “already done.”.

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Microsoft, for example, stopped patching Windows XP for security vulnerabilities in 2014. I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic.

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Microsoft, for example, stopped patching Windows XP for security vulnerabilities in 2014. I’m Robert Vamosi and this episode about best practices in information security, and how critical life services, in particular, remain at risk today -- in the middle of a global pandemic.

List of data breaches and cyber attacks in August 2019 – 114.6 million records leaked

IT Governance

Multiple sites affiliated with the University of Florida student government hacked (unknown). Internet hosting provider Hostinger resets users’ passwords after security breach (14 million). French police ‘neutralize’ Monero mining virus as it spreads worldwide (850,000). A coordinated ransomware attack hits at least 20 local governments in Texas (unknown). Online clothing retailer Poshmark confirms data breach (unknown).