Retail data breaches involving customer data happen often today. However, they tend to be smaller insize than health care, finance or government breaches. So, the general public notices them less.…
Browsing Categorycustomer experience
Adopting Microsegmentation Into Your Zero Trust Model, Part 3
This is the third and final part in a series on zero trust and microsegmentation. Be sure to check out Parts 1 and 2. The customer relationship used to be…
Retail Cybersecurity: How to Protect Your Customer Data
In the early days of the pandemic, many retailers quickly launched e-commerce stores for the first time. Others expanded their offerings, such as adding online ordering with curbside pick-up. Within only…
Creating Brand Trust: A Key Currency for Business
This is the first in a blog series about building and maintaining brand trust. Brand trust has always been valuable for business, but the ways to develop it have changed…
Accelerate Your Digital Transformation with Security
In the current competitive landscape, businesses have to face the pressure to keep up with ever-changing business and market demands. For those who do not keep up with the speed…
Safeguard Sensitive Data With a Next-Generation Data Security Approach
There is no silver bullet when it comes to protecting sensitive data. No single security technology investment will eliminate the risk of data theft or a mistake exposing sensitive information.…
Achieve Flexibility in Business Through Digital Trust and Risk Management
I grew up watching professional football back in the 70s, when defenses were so good they had their own nicknames. The Pittsburgh Steelers had the “Steel Curtain,” the Miami Dolphins…
How CIAM Addresses the Challenges of Consumer Identity Management
Consumer identities are at the heart of brand engagements today. Digital interactions are a routine part of our lives and touchpoints for consumers have reached astounding heights. Nearly 60 percent…
A Proposed New Trust Framework for Physical and Digital Identity Interactions
Identity is a difficult term to define in the cybersecurity world. The range of personal information that can be associated with an identity interaction is highly dependent on the situational…
How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk
Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected…