Cybersecurity

Our Cybersecurity team ensures Target and our guests are protected 24/7 against cybercriminals and fraudsters. Every day our team of in-house experts analyze the latest threats, assess risk, engineer innovative solutions, and operate our Cyber Fusion Center around the clock to investigate and respond to potential attacks. As an industry-recognized leader in threat intelligence sharing, collaborative partnerships, and talent development, we take pride in seeing our impact extend well beyond Target to help create a safer future for all.

Recent blogs

  • Highlighted functionality for the Detect Hub platform

    Boost Detection Confidence: Lessons from Target's Rule Management Strategy

    October 7, 2024
    By Paul Hutelmyer
    Strategies on how to manage rulesets to achieve a more confident security posture.
  • photo of Target's Cyber Fusion Center entrance, with illuminated white letters mounted vertically to a black painted wall, and red striped carpet with a long hallway in the background

    Target's Cyber Fusion Center Highlights Open Source Projects

    February 27, 2024
    By Caleb Walch, Mauricio Rossi Sabarros, Eric Brandel, Paul Hutelmyer, and Joe Petroske
    Status of current open source projects from Target's cybersecurity team.
  • white text on a red background that reads "Friday Five, Tracy Favro, Lead Cyber Analyst" with a small image of Target mascot Bullseye the white bull terrier with a red Target bullseye around his eye

    "Friday Five" Featuring Tracy Favro, Lead Cybersecurity Analyst

    January 26, 2024
    By Tech @ Target
    Profile of Target Lead Cybersecurity Analyst Tracy Favro
  • graphic describing the three ways in which cyber capabilities apply to ORC - research the adversary, prevent and detect attacks, and investigate and respond

    Applying Cyber Principles to Combatting Organized Retail Crime

    August 29, 2023
    By Jodie Kautt
    How Target's cyber team collaborates to combat fraud
  • Target's patented EasySweep skimmer detection device, shown with a payment terminal that is safe to use, and one with a skimming device installed that puts guest data at risk

    Target's EasySweep – Simplifying Skimmer Detection for All

    July 18, 2023
    By Terry Woodman
    Target's patented EasySweep device protects guests' data from skimmers.
  • Identity Management Day 2023 logo on the left with round fingerprint-like design behind the words, and headshot of Target Senior Director of Cyber Solutions Tom Sheffield who is pictured smiling wearing a blue button down shirt and gray blazer against a red couch, with red carpet and atrium in the background

    Moving from "Or" to "And"

    April 11, 2023
    By Tech @ Target
    Interview with Senior Director Tom Sheffield to explore what Identity Management means at Target.
  • Target Cybersecurity Analyst Dat Dang, pictured smiling against a corporate conference room background, wearing eyeglasses, a button-down shirt, and navy blue blazer

    "Friday Five" - Featuring Dat Dang, Lead Cybersecurity Analyst

    March 3, 2023
    By Tech @ Target
    Profile of Target Lead Cybersecurity Analyst Dat Dang
  • status page screenshot from Gogs showing a Docker pipeline with a malicious config file called "evil.local:8080/payload"

    CI/CD Pipeline Incident Response

    February 16, 2023
    By Brandon Ingalls and Kyle Shattuck
    An actionable incident response playbook for your CI/CD pipeline.
  • light purple rectangle with five white circles in a horizontal line, each with a white icon inside. From left to right, icons include a sheet of paper with lines, a gear with tools against a browser window, a large white robot, a screen with circular arrows, and a check mark in a white circle

    Synthetics: Continuous Assurance of Detection Components

    December 13, 2022
    By Paul Hutelmyer
    This post provides a solution for utilizing synthetic events for the purpose of validating signature integrity and functionality, with the goal of achieving continuous assurance of a system’s detection signatures.
  • Target tech x BUiLT: Technical Mentorship, Reimagined

    November 17, 2022
    By Brenda Bjerke and Nii Quarshie
    How two Target cybersecurity team members reimagined their mentorship relationship and what they learned
  • Camp Cyber logo with a line drawing of a nighttime camping scene, and "Camp Cyber" written in letters that look like logs, next to headshot of Target CISO Rich Agostino

    Cybersecurity “State of the State”

    November 4, 2022
    By Tech @ Target
    October is Cybersecurity Awareness Month, recognized annually in the United States since 2004 as an opportunity to educate people about steps they can take to enhance the security of their digital worlds.
  • a series of five white icons in circles on a lavender background, from the far left icons picture a device that appears to have a variety of connections to it, an icon of a sheet of paper with lines on it, a cute dog icon with a space helmet, a sheet of paper with a magnifying glass above it, and an icon of a browser window

    Strelka: Real-Time Threat Hunting Scanner

    August 24, 2022
    By Paul Hutelmyer
    Strelka is a real-time, container-based, file scanning system used for threat hunting, threat detection, and incident response, built by our Target cybersecurity team.
  • screenshot of code snippet describing a payload wallet rule with Eric Brandel listed as author

    Behind the Scenes of Merry Maker

    February 1, 2022
    By Eric Brandel and Caleb Walch
    We recently introduced Target’s cybersecurity tool “Merry Maker” and open sourced the framework to help others protect against digital skimming.
  • Target store team member pictured wearing a Santa hat with holiday decor shelves behind him. The team member is showing something on a device to a young girl with a light purple coat on, and she looks surprised and happy

    Meet Merry Maker: How Target Protects Against Digital Skimming

    February 1, 2022
    By Chris Carlson
    Credit card skimmers are custom-made additions to payment devices (like ATMs or gas pumps) that criminals build and use to steal a consumer’s payment information.