6 Best Practices for Data Breach Protection

Keeping your data safe and protected often seems like an uphill battle. Consistently presenting a hardened attack surface to a would-be attacker and doing so across all the various attack vectors possible is a difficult problem to solve. The attacker only has to be right once, while you and your broader security team have to…

Read More

Biggest Holiday Risk Factors

This blog is part of the RH-ISAC holiday guidance blog series. For more blogs in this series, visit https://rhisac.org/blog/. As we enter the holiday season, malicious actors ramp up their attacks, seeking to take advantage of the increase in traffic to both digital and brick-and-mortar retailers and hospitality organizations. Attackers tend to be opportunistic: targeted, specific…

Read More

8 Tips for the Holiday Season

Our holiday guidance blog series for retail and hospitality continues. For more blogs in this series, visit https://rhisac.org/blog/ Being this time of the year, our sector needs to be vigilant. There’s a chill in the air, decorations hung in every window, children’s eyes sparkle with wonder and expectation… and hackers lurk around every corner. The holiday…

Read More

Top 5 Holiday Shopping Season Threats for Retail and Hospitality

This blog is part of the RH-ISAC holiday guidance blog series. For more blogs in this series, visit https://rhisac.org/blog/. The holiday season brings out more than decorations, carols, and hot chocolate. The drastic influx in retail activity as people scurry to cross items off their shopping lists means that hackers come out in droves and malicious…

Read More

Analyst Spotlight: TruSTAR Intel Architect Discusses the Evolution of Phishing Attacks

TruSTAR recently spoke at RH-ISAC’s Retail Cyber Intelligence Summit about best practices and insights about intelligence fusion. A major component to fusion and managing your intelligence is phishing triage. In this follow-up Q&A, we sat down with TruSTAR Intelligence Architect Neal Dennis to discuss phishing trends, its impact on consumer-facing companies, and how security teams can defend themselves…

Read More