Discussing the PCI Software Security Framework: What Merchants Need to Know

Payment acceptance begins with confidence in the security of transmitting data.  As technology advances and new platforms emerge, the security of the software that supports those transactions becomes increasingly critical to safeguarding payment information. Modern software development requires objective-focused security to support more nimble development and update cycles than traditional software development practices. This issue…

Read More

Top 5 Tips to Protect User Data

If there’s one thing that never changes in cybersecurity, it’s this: threat actors will always look for the path of least resistance to gain access to a victim’s network. While companies that collect and maintain personally identifiable information (PII) or protected health information (PHI) are often the preferred targets of threat actors, attackers will target…

Read More

Retail & Hospitality ISAC and The Media Trust Produce Joint Benchmarking Study on Third-Party Risks to Consumer-Facing Websites

Washington, D.C., December 18, 2019 — The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) and The Media Trust are pleased to announce that they have entered into a partnership to benchmark and improve eCommerce security and efficiency. The collaboration combines the RH-ISAC vision to transform the way companies mature capabilities and collaborate to…

Read More

Top 5 Holiday Shopping Season Threats for Retail and Hospitality

This blog is part of the RH-ISAC holiday guidance blog series. For more blogs in this series, visit https://rhisac.org/blog/. The holiday season brings out more than decorations, carols, and hot chocolate. The drastic influx in retail activity as people scurry to cross items off their shopping lists means that hackers come out in droves and malicious…

Read More

Don’t Let ATO Steal Your Holiday Season

Reports of account takeover (ATO) from our e-commerce customers have risen 67% in the past six months. What is driving this rise? Moreover, what can you do to combat it without impacting the vitally important holiday season?  Fraudsters use a number of tactics to takeover accounts, including social engineering, credential stuffing and phishing attacks. Regardless…

Read More