|By Business Wire||
|March 28, 2014 04:30 PM EDT||
Sally Beauty today updated customers on its ongoing investigation of a data breach incident and on efforts to provide support to any customers who may have been affected by the incident. The scope of the incident has not been fully determined. However, because of our commitment to protecting our customers we are offering one free year of credit monitoring and identity-theft protection for those customers who may have been affected by the incident.
“Our customers remain our top priority,” said Gary Winterhalter, Chairman, President and CEO. “Instructions for this service can be found through our website, sallybeautyholdings.com.”
As we previously announced, on March 5, 2014, our systems detected an unauthorized intrusion into our Sally Beauty Supply LLC network. Over the last several weeks, we have been comprehensively investigating the security incident with the assistance of our advisers. Based on the investigation, we previously reported that, although we would not speculate on the scope of the incident, we discovered evidence that fewer than 25,000 records containing card-present (track 2) payment card data may have been illegally accessed on our system. As a result of the continuing investigation, we now understand that a larger number of additional records containing payment card data may have been illegally accessed and removed from our systems.
As we have said previously, we will not speculate on the scope of our recent data security incident until the forensic review progresses because experience with such incidents at other retailers has taught that it is difficult to ascertain the extent of a data breach incident until the required forensic review is complete.
We will continue to provide updates regarding the status of the investigation and the steps we will be taking to assist any customers who may have been affected by the incident through our website, sallybeautyholdings.com. We will provide appropriate notifications to customers who may have been affected by the incident and others as the facts develop and we learn more.
About Sally Beauty Holdings, Inc.
Sally Beauty Holdings, Inc. (NYSE: SBH) is an international specialty retailer and distributor of professional beauty supplies with revenues of $3.6 billion annually. Through the Sally Beauty Supply and Beauty Systems Group businesses, the Company sells and distributes through 4,700 stores, including approximately 200 franchised units, throughout the United States, the United Kingdom, Belgium, Chile, France, the Netherlands, Canada, Puerto Rico, Mexico, Ireland, Spain and Germany. Sally Beauty Supply stores offer up to 10,000 products for hair, skin, and nails through professional lines such as Clairol, L’Oreal, Wella and Conair, as well as an extensive selection of proprietary merchandise. Beauty Systems Group stores, branded as CosmoProf or Armstrong McCall stores, along with its outside sales consultants, sell up to 10,000 professionally branded products including Paul Mitchell, Wella, Sebastian, Goldwell, Joico, and Aquage which are targeted exclusively for professional and salon use and resale to their customers. For more information about Sally Beauty Holdings, Inc., please visit sallybeautyholdings.com.
Cautionary Notice Regarding Forward-Looking Statements
Statements in this news release and the schedules hereto which are not purely historical facts or which depend upon future events may be forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Words such as “anticipate,” “believe,” “estimate,” “expect,” “intend,” “plan,” “project,” “target,” “can,” “could,” “may,” “should,” “will,” “would,” or similar expressions may also identify such forward-looking statement.
Readers are cautioned not to place undue reliance on forward-looking statements as such statements speak only as of the date they were made. Any forward-looking statements involve risks and uncertainties that could cause actual events or results to differ materially from the events or results described in the forward-looking statements, including, but not limited to, risks and uncertainties related to: the highly competitive nature of, and the increasing consolidation of, the beauty products distribution industry; anticipating changes in consumer preferences and buying trends and managing our product lines and inventory; potential fluctuation in our same store sales and quarterly financial performance; our dependence upon manufacturers who may be unwilling or unable to continue to supply products to us; the possibility of material interruptions in the supply of beauty supply products by our manufacturers or third-party distributors; products sold by us being found to be defective in labeling or content; compliance with laws and regulations or becoming subject to additional or more stringent laws and regulations; product diversion; the operational and financial performance of our franchise-based business; the success of our e-commerce business; successfully identifying acquisition candidates and successfully completing desirable acquisitions; integrating acquired businesses; opening and operating new stores profitably; the impact of the health of the economy upon our business; the success of our cost control plans; protecting our intellectual property rights, particularly our trademarks; the risk that our products may infringe on the intellectual property of others; conducting business outside the United States; disruption in our information technology systems, including as a result of natural or man-made events (caused by us, by our service providers or others) or by computer viruses, or physical or electronic break-ins; reports that our information systems were breached; a significant data security breach, including misappropriation of our customers’ or employees’ personal information, the potential costs related thereto, which may include, among others, liabilities to payment card networks for reimbursements of credit card fraud and card reissuance costs, including fines and penalties, liabilities from governmental investigations or litigation, legal, forensic and consulting fees and expenses, and costs relating to remediation actions, and the negative impact on our reputation and loss of confidence of our customers, suppliers and others; a failure to detect, determine the extent of and appropriately respond to a significant data security breach; costs and diversion of management attention required to investigate and remediate a data security breach, including any governmental investigations or litigation relating thereto; our ultimate determination of the scope and severity of the recent data security breach; severe weather, natural disasters or acts of violence or terrorism; the preparedness of our accounting and other management systems to meet financial reporting and other requirements and the upgrade of our financial reporting system; being a holding company, with no operations of our own, and depending on our subsidiaries for cash; our substantial indebtedness; the possibility that we may incur substantial additional debt, including secured debt, in the future; restrictions and limitations in the agreements and instruments governing our debt; generating the significant amount of cash needed to service all of our debt and refinancing all or a portion of our indebtedness or obtaining additional financing; changes in interest rates increasing the cost of servicing our debt; the potential impact on us if the financial institutions we deal with become impaired; and the costs and effects of litigation.
Additional factors that could cause actual events or results to differ materially from the events or results described in the forward-looking statements can be found in our most recent Annual Report on Form 10-K for the year ended September 30, 2013, as filed with the Securities and Exchange Commission. Consequently, all forward-looking statements in this release are qualified by the factors, risks and uncertainties contained therein. We assume no obligation to publicly update or revise any forward-looking statements.
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Mar. 29, 2017 06:30 AM EDT Reads: 6,242
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
Mar. 29, 2017 06:00 AM EDT Reads: 9,029
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, will discuss how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He will discuss how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Mar. 29, 2017 06:00 AM EDT Reads: 2,805
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to transi...
Mar. 29, 2017 05:00 AM EDT Reads: 6,401
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Mar. 29, 2017 04:00 AM EDT Reads: 15,076
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Mar. 29, 2017 04:00 AM EDT Reads: 3,175
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Mar. 29, 2017 03:45 AM EDT Reads: 2,129
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Mar. 29, 2017 03:30 AM EDT Reads: 11,749
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Mar. 29, 2017 03:30 AM EDT Reads: 3,208
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
Mar. 29, 2017 03:30 AM EDT Reads: 3,208
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Mar. 29, 2017 03:30 AM EDT Reads: 3,348
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Mar. 29, 2017 03:00 AM EDT Reads: 6,066
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Mar. 29, 2017 01:45 AM EDT Reads: 5,438
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
Mar. 29, 2017 01:15 AM EDT Reads: 2,486
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Mar. 29, 2017 01:15 AM EDT Reads: 9,279