Target, Gap, other retailers join to share cyberthreat data
A range of retailers will share cyberthreat data through a new center to prevent attacks
IDG News Service - Some of the biggest U.S. retailers have banded together to share information about cyberthreats, in a bid to avert breaches like that suffered by Target last holiday season.
Target, The Gap, Walgreens and J.C. Penney are among the members of the group, which will share real-time threat information with each other and with the Department of Homeland Security, Secret Service, FBI and other "public and private stakeholders," they said Wednesday.
They'll share information about new strains of malware, activity on underground forums and potential software vulnerabilities, which they said will be translated into "actionable intelligence." They'll also share anonymized information with the U.S. government.
The goal of the organization, called the Retail Cyber Intelligence Sharing Center, or R-CISC, is to help the retailers get out in front of emerging threats. It follows a data breach at Target late last year in which millions of payment card details and other personal records were lost, in one of the largest data breaches in history.
Education and training are part of the program, but the success of the effort hinges on the amount of information retailers can gather and their willingness to share it.
"We are confident that by sharing with our peers and industry stakeholders through the R-CISC, our industry will collectively strengthen its ability to protect critical customer information," Warren Steytler, vice president of information security at Lowe's, said in the announcement.
Other participants are American Eagle Outfitters, Nike, Safeway and VF Corp., which operates Vans and Nautica, among others.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!