The Future of Retail in a Time of Uncertainty

Four months ago, the Javits Center in New York City was bustling with more than 40,000 people attending the National Retail Federation (NRF) 2020 Vision: Retail’s Big Show. Navigating retail innovation across four incongruent floors covering 760,000 square feet – with a 15-story glass-enclosed Crystal Palace high and wide enough for endless imagination – seems…

Read More

RH-ISAC Holiday Tips Featured on Dark Reading

Recently, RH-ISAC’s Director of Intelligence Operations Muktar Kelati spoke with Dark Reading about how retailers can protect themselves from hackers and scammers seeking to put a damper on both holiday spirits and sales. While retail and hospitality organizations are already working on rolling out sales, deals and other holiday promotions, threat actors are also making their lists…

Read More

Analyst Spotlight: TruSTAR Intel Architect Discusses the Evolution of Phishing Attacks

TruSTAR recently spoke at RH-ISAC’s Retail Cyber Intelligence Summit about best practices and insights about intelligence fusion. A major component to fusion and managing your intelligence is phishing triage. In this follow-up Q&A, we sat down with TruSTAR Intelligence Architect Neal Dennis to discuss phishing trends, its impact on consumer-facing companies, and how security teams can defend themselves…

Read More

Two-Birds, One Stone: Invest in Both Cybersecurity Operations and Employee Growth

The growing threat landscape has amplified a need for talent and tools to better understand, interoperate, and thwart cyber threats. Through the RH-ISAC’s trusted partnerships with Associate members, retail and hospitality cybersecurity practitioners are able to gain knowledge and build skills in myriad manner. One such partnership is with Root9B (R9B), a company that ‘understands…

Read More

Social media is a threat actor’s recon tool

Social media networks like Facebook, Instagram, Twitter and LinkedIn were originally designed to connect people all over the world. Now, it has become an active underworld for threat actors seeking personal and organizational information from users. Social media has become a reconnaissance tool – a tried and true method of collecting data – to hijack…

Read More