Social media is a threat actor’s recon tool

Social media networks like Facebook, Instagram, Twitter and LinkedIn were originally designed to connect people all over the world. Now, it has become an active underworld for threat actors seeking personal and organizational information from users. Social media has become a reconnaissance tool – a tried and true method of collecting data – to hijack…

Read More

Building Strength In Our Pack, by Jim Cameli, VP & Global CISO, Walgreens Boots Alliance

For the strength of the pack is the wolf, and the strength of the wolf is the pack.“The Law for the Wolves” by Rudyard Kipling This is a favorite line of mine from Rudyard Kipling and one I truly believe sums up the value associated with being a member of the RH-ISAC. Our people, our companies, and our industries ALL become…

Read More

Member Spotlight

Managing time to complete intelligence sharing is a huge priority for Peer Choice Winner Angeline Button. She manages to be a rock-solid resource for not only the intel sharing community, but as a strong female influence in cyber security. Angeline is the practice lead of Threat Hunting & Intelligence at Dillard’s. In her role, she…

Read More

We’ve Changed Our Name, but the Mission Remains the Same

The RH-ISAC was built to create a secure place for retailers to share cybersecurity information and intelligence to not only better protect their own companies, but to also strengthen the entire sector – a rising tide lifting all boats. What started with about 30 companies coming together in Pittsburgh, PA, in 2014 has now grown…

Read More

Enhance your Cybersecurity Stance with the RH-ISAC’s Hands-on Workshops

It’s no secret that retail, hospitality and consumer-facing companies face cybersecurity concerns. Security breaches damage the trust customers have in a brand, hurt revenue and may even cause permanent damage to the brand. Every indicator suggests that cyberattacks will continue to strike our sectors, but our collaboration helps all member security departments improve cybersecurity –…

Read More