It’s time to think twice about retail loyalty programs

Thales eSecurity

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. What I’d originally planned to write about was a topic that directly applies – why retailers of all stripes are not investing in data security.

Security Affairs newsletter Round 181 – News of the week

Security Affairs

The best news of the week with Security Affairs. Magecart cybercrime group stole customers credit cards from Newegg electronics retailer. Ngrok Mining Botnet. Security Affairs – Newsletter ). A new round of the weekly SecurityAffairs newsletter arrived!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

The Last Watchdog

If digital transformation, or DX , is to reach its full potential, there must be a security breakthrough that goes beyond legacy defenses to address the myriad new ways threat actors can insinuate themselves into complex digital systems. NTA refers to using advanced data mining and security analytics techniques to detect and investigate malicious activity in traffic moving between each device and on every critical system in a company network.

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

Recently, I've witnessed a couple of incidents which have caused me to question some pretty fundamental security basics with our local Aussie telcos, specifically Telstra and Optus. This screen faces out into the retail store with people constantly wandering past it only a couple of meters away, well within the distance required to observe the contents off it. Alarmingly, this is not unprecedented and I've been blocked before myself for reporting a security incident.

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

Ethical data management means you need data governance and data security by design – these initiatives are hard to retrofit. Kate Tickner, Reltio.

MDM 52

Oracle critical patch advisory addresses 284 flaws, 33 critical

Security Affairs

The flaw also affected the Financial Services Analytical Applications Infrastructure, the Fusion Middleware MapViewer, and four three Oracle Retail components. The critical patch advisory for 2019 also fixed the CVE-2018-11776 vulnerability in the OCA’s Communications Policy Management Component, this issue was exploited in 2018 by threat actors to mine cryptocurrency. The post Oracle critical patch advisory addresses 284 flaws, 33 critical appeared first on Security Affairs.

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

Now facial recognition appears to be on the verge of blossoming commercially, with security use-cases paving the way. And their grander vision is to help establish a nationwide biometric database in which a hybrid facial ID/fingerprint can be used for things such as fraud-proofing retail transactions, or, say, taking a self-driving vehicle for a spin. Their use for security access in other public settings, such as schools and workplaces, appear to be part of a natural progression.

List of data breaches and cyber attacks in August 2019 – 114.6 million records leaked

IT Governance

Internet hosting provider Hostinger resets users’ passwords after security breach (14 million). French police ‘neutralize’ Monero mining virus as it spreads worldwide (850,000). Online clothing retailer Poshmark confirms data breach (unknown).

Cognitive Agents to Improve User Experience

Perficient Data & Analytics

And it includes self-learning systems that leverage data mining, pattern recognition, and natural language processing (NLP) to mimic patterns of the human brain. This technology can also improve data security, customer and employee experience, and visibility over business processes. Others have also seen benefits by combining cognitive agents with internal processes to do things like speed up on-boarding processes and reduce security concerns and errors. .

Attacks against machine learning — an overview

Elie

A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. bought from very few retailers—created a host of anomalies that were detected by the lottery organization.

Mining 113

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

eBay: One of the world’s most valuable retailer has no inventory. Where Amazon plans to take the grocery industry (as well as the entire retail industry) starts with their mission statement: Traditional Grocer : “Our goal is to be the first choice for those customers who have the opportunity to shop locally”. 80% of customers want a personalized experience from their retailer. 2] “ Retail: How to Keep it Personal & Take Care of Privacy ”.

Attacks against machine learning — an overview

Elie

A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. bought from very few retailers—created a host of anomalies that were detected by the lottery organization.

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

eBay: One of the world’s most valuable retailer has no inventory. 80% of customers want a personalized experience from their retailer. 2] “ Retail: How to Keep it Personal & Take Care of Privacy ”.

Federal Agency Data is Under Siege

Thales eSecurity

With more than 65,000 employees in 56 countries, Thales is a global leader in technology solutions for the aerospace, transport, defence and security markets. Its unique capabilities include the design and deployment of equipment, systems and services to meet complex security requirements.

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI

CGI

For utilities, these are green field areas, and clients frequently ask me how CGI provides data support to more advanced industries like retail banking and telecoms. Once a utility secures its data, the data must be stored and integrated even with external data sources.

After the Token Act: A New Data Economy Driven By Small Business Entrepreneurship

John Battelle's Searchblog

Since moving to the area from California, she’s noticed two puzzling trends: First, a dearth of interesting mid- to high-end dinner spots walking distance from her new place, and second, what appears to be higher-than-average vacancy rates for the retail storefronts in the same general area.