article thumbnail

Why Retailers Must Avoid Passwords

HID Global

Discover how RFID reader technology revolutionizes retail with secure, passwordless authentication for enhanced efficiency and security. Learn more.

Retail 52
article thumbnail

GeekWire Podcast: Costco vs. Amazon, Microsoft’s latest Copilot, and a Zulily conspiracy theory

GeekWire

Plus, our colleague Taylor Soper’s deep dive into the downfall of Zulily bolsters a not-so-far-fetched hypothesis about the motives of the private equity firm that acquired and ultimately shut down the online retailer.

Retail 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Labor Day Cyber Scams: What to Watch Out For

SecureWorld News

Common Labor Day scams to watch out for Fake Retail Promotions: Cybercriminals create counterfeit websites or email campaigns that mimic legitimate retailers offering massive discounts on popular products. Email Filters and Authentication: Implement robust email filters that can identify and quarantine phishing emails.

article thumbnail

Passwordless MFA for Customers: How to Fortify Security without Introducing Friction

CIO Business Intelligence

Password-based authentication is likely the most widely used method of authenticating users to online services. Password-based authentication is used because it is easy to understand and implement. They provide multifactor authentication (MFA) without the usual burden on the user. on a user’s other online accounts.

article thumbnail

IDG Contributor Network: The retail EMV quagmire

ComputerWorld IT Management

Retailers have this love-hate relationship with EMV, in that they love to hate EMV. With that in mind, it's easy to understand why major retailers — Walmart last month and Home Depot last week — are suing Visa and MasterCard in an attempt to fight chip cards any way they can. Of course, the retail argument isn't quite phrased that way.

Retail 41
article thumbnail

Don’t gamble with your identity verification practices

CIO Business Intelligence

Okta issued an alert to clients in late August warning about incoming threats by hackers to gain access to “manipulate the delegated authentication flow via Active Directory (AD) before calling the IT service desk at a targeted organization, requesting a reset of all MFA factors in the target account.” Ransomware, Security

article thumbnail

With greater personalisation comes greater security

CIO Business Intelligence

It can often feel as though trust and authenticity are in short supply these days. For retailers and brands, striking a balance between personalisation and security is the ultimate challenge. The trust game It’s obvious that for brands and retailers, security and trust matter. Trust will need to be maintained throughout.