RH-ISAC Holiday Tips Featured on Dark Reading

Recently, RH-ISAC’s Director of Intelligence Operations Muktar Kelati spoke with Dark Reading about how retailers can protect themselves from hackers and scammers seeking to put a damper on both holiday spirits and sales. While retail and hospitality organizations are already working on rolling out sales, deals and other holiday promotions, threat actors are also making their lists…

Read More

Analyst Spotlight: TruSTAR Intel Architect Discusses the Evolution of Phishing Attacks

TruSTAR recently spoke at RH-ISAC’s Retail Cyber Intelligence Summit about best practices and insights about intelligence fusion. A major component to fusion and managing your intelligence is phishing triage. In this follow-up Q&A, we sat down with TruSTAR Intelligence Architect Neal Dennis to discuss phishing trends, its impact on consumer-facing companies, and how security teams can defend themselves…

Read More

Together We Are Stronger

The RH-ISAC community grows every year and the 2019 Retail Cyber Intelligence Summit in Denver was a testament to our growing community and a success because of it! We had nearly 300 attendees talking cybersecurity, sharing best practices and planning how to protect as one over the next year. Check out some highlights from a…

Read More

Another Round of Applause for our Peer Choice Award Winners!

2019 has been another great year for RH-ISAC! During the Retail Cyber Intelligence Summit in Denver, CO, RH-ISAC members came together to share ideas, collaborate, talk threat intelligence, and celebrate the year. RH-ISAC hosted an annual member meeting during the Member Gala as a way to honor our community, congratulate them on all that they…

Read More

Don’t Let ATO Steal Your Holiday Season

Reports of account takeover (ATO) from our e-commerce customers have risen 67% in the past six months. What is driving this rise? Moreover, what can you do to combat it without impacting the vitally important holiday season?  Fraudsters use a number of tactics to takeover accounts, including social engineering, credential stuffing and phishing attacks. Regardless…

Read More