{"version":"1.0","provider_name":"Total Retail","provider_url":"https:\/\/www.mytotalretail.com","author_name":"Joe Keenan","author_url":"https:\/\/www.mytotalretail.com\/author\/jkeenan\/","title":"2018 Thales Data Threat Report, Trends in Encryption and Data Security \u2014 Retail Edition - Total Retail","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"mAVFL00duU\"><a href=\"https:\/\/www.mytotalretail.com\/resource\/2018-thales-data-threat-report-trends-in-encryption-and-data-security-retail-edition\/\">2018 Thales Data Threat Report, Trends in Encryption and Data Security \u2014 Retail Edition<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mytotalretail.com\/resource\/2018-thales-data-threat-report-trends-in-encryption-and-data-security-retail-edition\/embed\/#?secret=mAVFL00duU\" width=\"600\" height=\"338\" title=\"&#8220;2018 Thales Data Threat Report, Trends in Encryption and Data Security \u2014 Retail Edition&#8221; &#8212; Total Retail\" data-secret=\"mAVFL00duU\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.mytotalretail.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"U.S. retail faces daunting digital challenges, and IT security is among the biggest. Traditional retailers are struggling to balance brick-and-mortar businesses with emerging online retail trends, while at the same time battling digital natives like Amazon.com and Wayfair. With ultra-high volumes of personally identifiable information (PII) and payment card information changing hands with every transaction, the retail industry is one of the most, if not the most, vulnerable targets for cyberattacks. Not surprisingly the question on the minds of IT and business leaders in U.S. retail is, \u201cWhat will it take to stop the breaches?\u201d The data in this report are derived from detailed input from 100 senior retail IT security managers in the U.S. and 96 IT security managers from retailers in other countries, and is part of the Global Thales 2018 Global Data Threat Report. The report polled 1,200 IT security managers in eight countries and across four major vertical markets."}