Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 30 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Target CIO resignation during "significant transformation"

by The Gurus
March 6, 2014
in Editor's News
Share on FacebookShare on Twitter

Following the breach which affected tens of millions of users, the CIO of American retailer Target has resigned.
 
According to media reports, Beth Jacob is the first high-level executive to leave the company following the breach of 70 million records after six years in the position. Target said that it will replace Jacob, but with an external hire, and the position will be “elevated” to CISO as part of its plan to tighten its security. According to Reuters, Target will also hire into a new position of chief compliance officer.
 
Jacob said that resigning was a “difficult decision,” but she said that “this was a time of significant transformation for the retail industry and for Target”, not mentioning the data breach.
Target Chairman, president and CEO Gregg Steinhafel said in a statement: “While we are still in the process of an ongoing investigation, we recognise that the information security environment is evolving rapidly.”
 
It was revealed in February that the initial intrusion was made possible by the use of network credentials that were stolen from a third party vendor last November, which led on to the installation of malware named “Black POS” which infected the point of sale system.
 
A month ago, Target chief financial officer and executive vice president John Mulligan said that the cyber attack has strengthened its resolve and it will make “Target, and our industry, more secure for customers in the future”.

FacebookTweetLinkedIn
Tags: BreachCIO
ShareTweetShare
Previous Post

FreedomPop Launches Encrypted 'Snowden Phone'

Next Post

BYOD could be solution to impending XP end

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 30, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information