Trustwave Report: Malware Continues to Exploit Unsecured Vendor Access

Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report.

Source: 2017 Trustwave Global Security Report

The number of incidents in corporate and internal network environments increased from 41% in 2015 to 43% in 2016, indicating companies need to review and improve network security controls to ensure their data is guarded against cyber-attacks.… Read on

Sally Beauty Breached… Again?

Data breach at Sally BeautyEarlier this week, Texas-based beauty supply chain Sally Beauty revealed that it was investigating “unusual activity involving payment cards” at some of its locations.  If a breach is confirmed, it would mark the second time in 14 months that the large cosmetics retailer has had customer data compromised.… Read on

2014 Retail Cyberthreat Summit – register here

Retail Cybersecurity Summit 2014Hackers have racked up more than a dozen high profile breaches of retail networks in the year since the Target attack.  This holiday season finds retailers stretched to meet increased IT demands with a larger-than-ever target on their backs.  Join Netop and our colleagues from Tripwire, Rippleshot, ID Experts and iovation as we discuss the increased risk confronting retailers and how you can reduce vulnerability during the 2014 Retail Cyberthreat Summit on Thursday, December 11 at 2:00 EST/11:00 PST.… Read on

Hackers Hit Albertson’s, Community Health Systems

hackedIt’s been a busy couple of days in the world of cybersecurity.  On Friday, two of the largest grocery store chains in the United States – Albertson’s and SuperValu – announced that their payment systems had been hacked.  … Read on

A checklist for managing vendor network access

One nice thing about retail network security being front-of-mind is that more resources are popping up to help retail IT teams.  Over at his Front Line Sentinel blog, Matthew Pascucci has done a good job of walking through the steps retail network security pros need to take in managing vendor access.… Read on