Top 5 Holiday Shopping Season Threats for Retail and Hospitality

This blog is part of the RH-ISAC holiday guidance blog series. For more blogs in this series, visit https://rhisac.org/blog/. The holiday season brings out more than decorations, carols, and hot chocolate. The drastic influx in retail activity as people scurry to cross items off their shopping lists means that hackers come out in droves and malicious…

Read More

Tala Security’s 2019 State of the Web Report

The Tala Security 2019 State of the Web report is here! The report is designed to educate enterprises about the significant and under-recognized security challenges related to their web assets. Tangible data, risk analysis and insights are presented as gleaned from the most frequented websites in the US defined by the Alexa 1000.  Key findings…

Read More

Retail and Hospitality Threat Trend Report

Retail and hospitality industries are in the midst of a technology adoption boom. Digital channels are being expanded as consumers go online at all stages of the purchase process—from information gathering, to pre-purchase, to post-purchase service. RH-ISAC and Accenture Security’s iDefense have teamed up to provide a first of its kind threat intelligence report for…

Read More

New Report: The State of Cyber Intelligence in the U.S.

How do organizations across the United States perform cyber intelligence? A new report from the Software Engineering Institute (SEI) reveals what we’re getting right, where we could improve, and what the future looks like. In 2018, researchers at the Carnegie Mellon University SEI set out to answer those questions. In a study commissioned by the…

Read More

The Need for Cyber Threat Intelligence: What Are we Concerned About?

This is one of a series of posts addressing key threats to the retail sector in an attempt to identify which information assets and systems must be protected, and to examine the value of identifying adversaries and intelligence consumers. Today, the most serious data breaches and disruptions result from well-planned, complex attacks that target specific…

Read More