{"id":9566,"date":"2015-06-30T05:15:09","date_gmt":"2015-06-30T12:15:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9566"},"modified":"2015-06-30T09:25:28","modified_gmt":"2015-06-30T16:25:28","slug":"better-threat-intelligence-and-information-sharing-among-global-retailers","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/06\/better-threat-intelligence-and-information-sharing-among-global-retailers\/","title":{"rendered":"Better Threat Intelligence and Information Sharing Among Global Retailers"},"content":{"rendered":"<p>The increasing volume and sophistication of cyber threats means all organizations must evolve their security posture. This is especially important in retail: a business environment in which undetected cyber attacks can negatively affect customer loyalty and hurt brand reputation among consumers.<\/p>\n<p>Helping retailers realize the benefits of next-generation security -- and prevent breaches -- is one reason Palo Alto Networks has joined the Retail Cyber Intelligence Sharing Center\u00a0(R-CISC) through its Associate Member Program. The Associate Member Program allows the R-CISC's retailer and commercial services member organizations to collaborate and share threat intelligence and critical cybersecurity information in real time with the industry's leading security solutions providers.<!--more--><\/p>\n<p>Our participation in R-CISC means that R-CISC members will receive\u00a0access to Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research.html\" target=\"_blank\">threat intelligence<\/a>, including <a href=\"http:\/\/media.paloaltonetworks.com\/lp\/autofocus\/?ts=autofocus\" target=\"_blank\">information on advanced attacks, campaigns and adversaries<\/a> from the <a href=\"http:\/\/media.paloaltonetworks.com\/lp\/autofocus\/?ts=autofocus\" target=\"_blank\">AutoFocus <\/a>and <a href=\"https:\/\/www.paloaltonetworks.com\/products\/technologies\/wildfire.html\" target=\"_blank\">WildFire <\/a>services, and the <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research.html\" target=\"_blank\">Unit 42 research and analysis team<\/a>.<\/p>\n<h3 style=\"margin: 0in; margin-bottom: .0001pt;\">For more<\/h3>\n<ul>\n<li><a href=\"https:\/\/paloaltonetworks.com\/company\/press\/2015\/palo-alto-networks-joins-the-retail-cyber-intelligence-sharing-center-in-newly-launched-associate-member-program\" target=\"_blank\">Read today's full announcement with R-CISC<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/products\/platforms.html\" target=\"_blank\">Learn about the Palo Alto Networks Security Platform<\/a><\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/company\/security-for-retail\" rel=\"nofollow,noopener\"  target=\"_blank\">Visit our LinkedIn page for retail security and join the discussion<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The increasing volume and sophistication of cyber threats means all organizations must evolve their security posture. This is especially important in retail: a business environment in which undetected cyber attacks can negatively &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,1229,108],"tags":[1132,1265,1267],"coauthors":[709],"class_list":["post-9566","post","type-post","status-publish","format-standard","hentry","category-announcement","category-security-platform","category-threat-prevention-2","tag-autofocus","tag-r-cisc","tag-retail-cyber-intelligence-sharing-center"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9566"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9566\/revisions"}],"predecessor-version":[{"id":9574,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9566\/revisions\/9574"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9566"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}