Data monetization: driving the new competitive edge in retail

CGI

Data monetization: driving the new competitive edge in retail. Retailers are fully aware that their future relies largely on their ability to use data efficiently. Data has become an essential resource and a key element in the growth strategy of large retail organizations.

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. In this case, it looks as though the attackers had been on the Starwood network for somewhere around three years, mining out their reservations database (keep in mind that Marriott only acquired Starwood in 2016 ). What I’d originally planned to write about was a topic that directly applies – why retailers of all stripes are not investing in data security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Life Cycle of a Breached Database

Krebs on Security

There, denizens with computer rigs that are built primarily for mining virtual currencies can set to work using those systems to crack passwords. Earlier this month, customers of the soccer jersey retailer classicfootballshirts.co.uk

Open the Gates for Next-Gen Loyalty

Reltio

Especially for CPG, retail, or hospitality business. Delivering omni-channel, consistent, and delightful customer experience is critical in retail, and it can be leveraged further for successful loyalty programs.” Do you have new depths of insight and understanding of your customers by automatically mining the value of relationships between customers and the people, places, and things they interact with every day? Ankur Gupta, Sr. Product Marketing Manager, Reltio.

#ModernDataMasters: Mike Evans, Chief Technology Officer

Reltio

A passion of mine is imparting the knowledge and experience that the data leaders of today possess to the next generation of data professionals. For example, twenty or even ten years ago in food retail, focus on item cost was important, a description of the item and not much beyond that! In the food retail example, there are considerations around nutrition, allergies, availability, web feeds, different channels and much more. Kate Tickner, Reltio.

MDM 63

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

There are several other business book favourites of mine including “The Lean Startup” , “Shoe Dog” , “The Upstarts” , and “The Pumpkin Plan” I take inspiration from them all as they have helped me to develop Agile Solutions into the company it is today. Kate Tickner, Reltio. Steve Whiting is the COO of Agile Solutions (GB) Ltd, a specialist data management and analytics consultancy that focuses on tangible business benefits.

MDM 40

Prometei botnet is targeting ProxyLogon Microsoft Exchange flaws

Security Affairs

The crypto-mining has a modular structure and employes multiple techniques to infect systems and evade detection. Prometei has been observed to be active in systems across a variety of industries, including: Finance, Insurance, Retail, Manufacturing, Utilities, Travel, and Construction.”

How to Take Your Business to The Next Level with Data Intelligence

erwin

With tools such as Artificial Intelligence, Machine Learning, and Data Mining, businesses and organizations can collate and analyze large amounts of data reliably and more efficiently. Retail. What Is Data Intelligence?

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

eBay: One of the world’s most valuable retailer has no inventory. Where Amazon plans to take the grocery industry (as well as the entire retail industry) starts with their mission statement: Traditional Grocer : “Our goal is to be the first choice for those customers who have the opportunity to shop locally”. 80% of customers want a personalized experience from their retailer. 2] “ Retail: How to Keep it Personal & Take Care of Privacy ”.

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

SOAR, if you haven’t heard, is a hot new technology stack that takes well-understood data mining and business intelligence analytics methodologies — techniques that are deeply utilized in financial services, retailing and other business verticals – and applies them to cybersecurity. There’s a frantic scramble going on among those responsible for network security at organizations across all sectors. Related: Why we’re in the Golden Age of cyber espionage.

MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

The Last Watchdog

NTA refers to using advanced data mining and security analytics techniques to detect and investigate malicious activity in traffic moving between each device and on every critical system in a company network. The data thieves gained elevated access to Target’s customer transactions database routing through the account of an HVAC contractor doing work for the retail giant.

Security Affairs newsletter Round 181 – News of the week

Security Affairs

Magecart cybercrime group stole customers credit cards from Newegg electronics retailer. Ngrok Mining Botnet. A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! Cyber attack took offline flight display screens at the Bristol Airport.

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

And their grander vision is to help establish a nationwide biometric database in which a hybrid facial ID/fingerprint can be used for things such as fraud-proofing retail transactions, or, say, taking a self-driving vehicle for a spin. It’s now commonplace for high-resolution video cams to feed endless streams of image data into increasingly intelligent data mining software.

Oracle critical patch advisory addresses 284 flaws, 33 critical

Security Affairs

The flaw also affected the Financial Services Analytical Applications Infrastructure, the Fusion Middleware MapViewer, and four three Oracle Retail components. The critical patch advisory for 2019 also fixed the CVE-2018-11776 vulnerability in the OCA’s Communications Policy Management Component, this issue was exploited in 2018 by threat actors to mine cryptocurrency.

Attacks against machine learning — an overview

Elie

A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine. bought from very few retailers—created a host of anomalies that were detected by the lottery organization.

Attacks against machine learning — an overview

Elie

A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine. bought from very few retailers—created a host of anomalies that were detected by the lottery organization.

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

eBay: One of the world’s most valuable retailer has no inventory. Where Amazon plans to take the grocery industry (as well as the entire retail industry) starts with their mission statement: Traditional Grocer : “Our goal is to be the first choice for those customers who have the opportunity to shop locally”. 80% of customers want a personalized experience from their retailer. 2] “ Retail: How to Keep it Personal & Take Care of Privacy ”.

Cognitive Agents to Improve User Experience

Perficient

And it includes self-learning systems that leverage data mining, pattern recognition, and natural language processing (NLP) to mimic patterns of the human brain. In a world where over 2.5 quintillion bytes of data is created each day , having a tool to help deliver information to users efficiently is important. Cognitive agents are a tool that can improve user experience for both advisors and customers alike.

Top GRC Tools & Software for 2021

eSecurity Planet

LogicManager’s GRC solution has specific use cases across financial services, education, government, healthcare, retail, and technology industries, among others. Like other competitive GRC solutions, it speeds the process of aggregating and mining data, building reports, and managing files.

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

LogicManager’s GRC solution has specific use cases across financial services, education, government, healthcare, retail, and technology industries, among others. Like other competitive GRC solutions, it speeds the process of aggregating and mining data, building reports, and managing files.

Leaders need the technical detail

MIKE 2.0

When you think of organisations whose leaders fall into this category, Netflix, Amazon and Tesla immediately come to mind, but there is no reason to assume this management mindset should be limited to these cutting-edge video, retail or car companies! Medical, mining and energy businesses are among those that should be on the lookout for more immediate applications and perhaps partner on research efforts.

The World Is An Internet Startup Now

John Battelle's Searchblog

But as I scanned the room last night and watched those friends of mine, I realized that each of them was now involved in an Internet startup in some way or another. Together they've cooked up a startlingly new approach to commercial consumer photography, including a retail concept and, of course, a fully integrated digital and social media component. Dan, another anonymized pal of mine, made his name in real estate. Do you have examples like mine?

Selling and utilising personal data in an insolvency situation

Data Protection Report

Many businesses are suffering serious financial difficulties as a result of COVID-19, particularly those in the retail, hospitality and tourism sectors.

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

This screen faces out into the retail store with people constantly wandering past it only a couple of meters away, well within the distance required to observe the contents off it. Not just yours and mine either, that also includes the operators' credentials: The operator had to log into multiple systems and after a few password authentication failure attempts in each one of these systems due to typos by the operator I was able to assertion exactly what their username and password is.

We Have Yet to Clothe Ourselves In Data. We Will.

John Battelle's Searchblog

Imagine further if I could mash it up with other data entities – be they friends of mine, bands I like, or even brands? Within a few years, nearly every “hip” retail store will be lit with wifi, sensors, and sophisticated apps. As the consumer in this scenario, won’t you want to declare “who you are” to the retail brand’s sensing device? The post We Have Yet to Clothe Ourselves In Data. We Will.

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI

CGI

For utilities, these are green field areas, and clients frequently ask me how CGI provides data support to more advanced industries like retail banking and telecoms. There is an equally strong focus on optimizing operations, for both retailers grappling with shrinking margins and grid operators urged to “sweat” their assets. For robotic process automation (RPA), utilities are trailing 20 percentage points behind retail banking for the stages of “implementing” or “already done.”.

First, Software Eats the World, Then, The Mirror World Emerges

John Battelle's Searchblog

His thesis extends to transportation (think Uber but also FedEx, which runs on software), retail (besides Amazon, Walmart is a data machine), healthcare (huge data opportunity, as yet unrealized), energy (same), and even defense. Intelligence agencies do large-scale data mining with software to uncover and track potential terrorist plots.

Extending intranets to hard-to-reach staff: Controlled documents kiosk example

ChiefTech

Dendrobium mine is the first to trial the iPICK(Information Point, Illawarra Coal Kiosk) technology, with management, contractors and employees enjoying improved access to information and reduced complexity. The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

The Gap Scenario

John Battelle's Searchblog

* It's been a longstanding thesis of mine that Google's ability to reorder information in microseconds, based on our declared intent through a search query, has habituated us to expect an immediate and relevant response from nearly every website - and in particular, commercial sites. Yes, I'm talking about Gap, the retail clothing brand, but I'm also talking about the "gap" between where we are as an industry, and where we are headed.

After the Token Act: A New Data Economy Driven By Small Business Entrepreneurship

John Battelle's Searchblog

Since moving to the area from California, she’s noticed two puzzling trends: First, a dearth of interesting mid- to high-end dinner spots walking distance from her new place, and second, what appears to be higher-than-average vacancy rates for the retail storefronts in the same general area. It appears to be a buyer’s market for retail restaurant space in Chelsea. The site reconstructs around her answer, showing suggested data repositories she might mine.

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

The 57 percent rate statistic is the highest of all verticals we measured in this year’s report (others include the healthcare industry, the retail industry, and the financial services industry) or any region surveyed. Look at how frequently we hear about AWS S3 buckets left out in the clear with sensitive information for hackers to mine. Originally Featured in Global Military Communications Magazine’s June/July Issue.

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

When I was working for a retail company I thought it was fantastic. And in many cases, employers would expect you to go to work even if you were sick certainly in, even in places like retail. After breaches like SolarWinds, companies pledge to improve their digital hygiene.

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

When I was working for a retail company I thought it was fantastic. And in many cases, employers would expect you to go to work even if you were sick certainly in, even in places like retail. After breaches like SolarWinds, companies pledge to improve their digital hygiene.

The ONE Key Aspect of DB2 for z/OS Table-Controlled Partitioning that People Seem Most Likely to Forget

Robert's Db2

First, the basics: table-controlled partitioning refers to a means of range-partitioning the data in a table, so that, for example, sales records for retail store numbers 1-25 go into table space partition 1, records for store numbers 26-50 go into partition 2, records for store numbers 51-75 go into partition 3, and so on. Sometimes, an important DB2 for z/OS feature can be out there for years, and yet not be fully appreciated by lots of people in the DB2 user community.

List of data breaches and cyber attacks in August 2019 – 114.6 million records leaked

IT Governance

French police ‘neutralize’ Monero mining virus as it spreads worldwide (850,000). Online clothing retailer Poshmark confirms data breach (unknown). At first glance, August has been a quiet month for data breaches, with a total of 114,686,290 breached records. That’s about 10 percent of the monthly average coming into the month. But that figure comes from 95 incidents in total, which is the highest number of breaches we’ve had all year.