article thumbnail

Are Data Breaches the New Reality for Retail?

Thales Cloud Protection & Licensing

As digital transformation takes hold, the retail industry is under siege from cyber criminals and nation states attempting to steal consumers’ personal information, credit card data and banking information. Lines are now blurred between physical and digital experiences. retailers experiencing a breach in the last year.

Retail 66
article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

However, modernization and transformative technologies are creating new vulnerabilities resulting in data breaches. Our annual Thales Data Threat Report-Federal Edition , released today, found that 98% of federal agencies are storing sensitive data within a digitally transformative environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

Without APIs there would be no cloud computing, no social media, no Internet of Things. APIs are the glue that keeps digital transformation intact and steamrolling forward. APIs have been a cornerstone of our digital economy from the start. But APIs also comprise a vast and continually-expanding attack surface.

article thumbnail

SHARED INTEL: Report details how cyber criminals leverage HTTPS TLS to hide malware

The Last Watchdog

From January through March 2021, TLS concealed 45 percent of the malware Sophos analysts observed circulating on the Internet; that’s double the rate – 23 percent – seen in early 2020, Dan Schiappa, Sophos’ chief product officer, told me in a briefing. How TLS works is that there is an encryption point and a decryption point.

Malware 214
article thumbnail

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

The Last Watchdog

We’re undergoing digital transformation , ladies and gentlemen. And we’re in a nascent phase where clever advances are blossoming even as unprecedented data breaches arise in parallel. LW: Can you frame what’s going on with identities when it comes to digital transformation? Hudson: Sure.

article thumbnail

Maintaining Cybersecurity During Rapid Digital Transformation

Security Boulevard

In the business and technology world, perhaps its main effect has been to press the accelerator on digital transformation in organizations across the globe. Bringing automation, Artificial Intelligence (AI), machine learning, and the Internet of Things (IoT) to the workplace as part of digital transformation has many benefits.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

A chilling illustration of how APIs can factor into an attack sequence comes from the massive Capital One data breach. Former Amazon programmer Paige Thompson is facing a growing list of federal charges for her alleged theft of personal data of more than 100 million Capital One patrons. Dearth of planning. Runtime vigilance.

Big data 240