RH-ISAC Interviews: Jamie Butler, Endgame

“. . .the speed to weaponize a vulnerability has decreased down to days from the first PoC.” writes Endgame’s CTO, Jamie Butler. As part of our series from speakers and sponsors of this year’s Retail Cyber Intelligence Summit., we recently asked Jamie to respond to a few questions about the Summit and retail cybersecurity. What was…

Read More

Webinar Recap: Implementing Multifactor Authentication for E-Commerce

NIST Releases Cybersecurity Guide to Help Reduce Online Retail Fraud Over the past several months, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) has been collaborating with retailers and technology vendors on a cybersecurity project using multifactor authentication (MFA) to help reduce the risk of online fraudulent…

Read More

RH-ISAC Interviews: Justin Swisher, Anomali

“Organizations are recognizing that threat intelligence supports decision making, informs incident response and drives threat hunting,” writes Justin Swisher, Security Strategy Manager at Anomali—and speaker at the 2018 Retail Cyber Intelligence Summit. As part of our series from speakers and sponsors of this year’s Summit, we recently asked Justin to respond to a few questions about…

Read More

RH-ISAC Interviews: Phillip Miller, Brooks Brothers

“If our designers, buyers and innovators are hamstrung by security in the pursuit of product development, they will either go around us or fail to produce expected outcomes,” writes Phillip Miller, Head of Infrastructure & CISO, Brooks Brothers—and speaker at the 2018 Retail Cyber Intelligence Summit. We recently asked Phillip to respond to a few…

Read More

The Need for Cyber Threat Intelligence: What Are we Concerned About?

This is one of a series of posts addressing key threats to the retail sector in an attempt to identify which information assets and systems must be protected, and to examine the value of identifying adversaries and intelligence consumers. Today, the most serious data breaches and disruptions result from well-planned, complex attacks that target specific…

Read More