Company Details
nordstrom
46,897
619,222
43
nordstrom.com
0
NOR_1452719
In-progress

Nordstrom Company CyberSecurity Posture
nordstrom.comAt Nordstrom, we empower our employees to set their sights high and blaze their own trails. This is a place where your success and growth are truly a result of your own efforts and achievements. Our teams are made up of motivated people who work hard to become leaders within the company, at all levels of the organization. These well-traveled paths show how hard work, loyalty, a competitive spirit and your unwavering commitment to the customer can take you and your career to new places. In addition to being a great place to have a career, we’re also committed to respecting the environment and supporting our communities. To learn more, check out NordstromCares.com. Interested in joining the Nordstrom team? See some of our current opportunities under our Careers tab or visit careers.nordstrom.com to apply today.
Company Details
nordstrom
46,897
619,222
43
nordstrom.com
0
NOR_1452719
In-progress
Between 750 and 799

Nordstrom Global Score (TPRM)XXXX

Description: On November 5, 2018, the California Attorney General reported a data breach involving Nordstrom, Inc. The breach occurred on October 9, 2018, due to improper handling of employee data by a contract worker, potentially affecting names, Social Security numbers, and other personal information. No customer data was impacted, and the company has taken measures to prevent future incidents.


No incidents recorded for Nordstrom in 2025.
No incidents recorded for Nordstrom in 2025.
No incidents recorded for Nordstrom in 2025.
Nordstrom cyber incidents detection timeline including parent company and subsidiaries

At Nordstrom, we empower our employees to set their sights high and blaze their own trails. This is a place where your success and growth are truly a result of your own efforts and achievements. Our teams are made up of motivated people who work hard to become leaders within the company, at all levels of the organization. These well-traveled paths show how hard work, loyalty, a competitive spirit and your unwavering commitment to the customer can take you and your career to new places. In addition to being a great place to have a career, we’re also committed to respecting the environment and supporting our communities. To learn more, check out NordstromCares.com. Interested in joining the Nordstrom team? See some of our current opportunities under our Careers tab or visit careers.nordstrom.com to apply today.

Charlotte-based Belk, Inc., a privately-owned department store, began when William Henry Belk opened his first store in 1888 with his brother, Dr. John Belk, joining as a partner. What started as two brothers in business has now grown into a legacy of selling great products at great prices, treating

Apparel Group is a multi-award-winning global fashion and lifestyle retail conglomerate based in Dubai, UAE, with operations across the GCC. Today, Apparel Group caters to millions of eager shoppers through its 2,300+ retail stores and 85+ brands on all platforms while employing over 24,000 multicul

MC is a company from the SONAE group, and is a leader in the food retail industry in Portugal. We are a company made by all, to all. With a history of over 35 years of continuous growth, MC has a distinctive positioning in different business areas, with a vast portfolio of high quality products, se

The FlexKom franchise formula puts an end to business competition and gives birth to business collaboration on a global scale. Flexkom-at-home-franchise offers you the most innovative worldwide loyalty and credit card system in the world. The company is using a unique E.N.D.F. system, which is ba

Massmart, Africa’s second largest retail group, comprises four divisions operating in 423 stores, across 13 sub- Saharan countries. Through our widely–recognised, differentiated retail and wholesale formats, we have leading shares in the General Merchandise, Liquor, Home Improvement and wholesale Fo

AS Watson Group, the world’s largest international health and beauty retailer, is operating over 17,000 stores under 12 retail brands in 31 markets, with over 130,000 employees worldwide. For the fiscal year 2024, AS Watson Group recorded revenue of over US$24 billion. Every year, we are serving ove

About UNIQLO LifeWear Apparel that comes from the Japanese values of simplicity, quality, and longevity. Designed to be of the time and for the time, LifeWear is made with such modern elegance that it becomes the building blocks of each individual’s style. A perfect shirt that is always being made m

Kohl’s is a leading omnichannel retailer with more than 1,100 stores in 49 states. Kohl's business is built on a solid foundation of more than 60 million customers, an unmatched brand portfolio, industry-leading loyalty and Kohl's Card programs, a convenient and accessible nationwide store footprin

Whole Foods was founded in 1980 on the belief that where food comes from, and how it’s grown, matters. It meant creating quality standards, working with suppliers who achieve them, and sharing that information with our customers. And it radically changed the way people understood and shopped for foo
.png)
A category I never skip shopping on Black Friday is kitchen deals. Whether it's appliances, cookware, tools and gadgets, or food storage,...
Parade aims to feature only the best products and services. If you buy something via one of our links, we may earn a commission.
It's easily one of the best grooming gifts for men at Nordstrom right now.
Parade aims to feature only the best products and services. If you buy something via one of our links, we may earn a commission.
We sorted through Nordstrom's coupons and deals to find the best offers available. This week you can save up to 60% during the Nordstrom...
Parade aims to feature only the best products and services. If you buy something via one of our links, we may earn a commission.
Parade aims to feature only the best products and services. If you buy something via one of our links, we may earn a commission.
Nordstrom Rack has aggressive expansion plans to hit 400 stores by 2028. With 22 new openings this year signaling big commitments in...
There's something about the holidays that makes everything feel a little softer, a little cozier — and if you ask me, a lot cuter.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Nordstrom is http://www.nordstrom.com.
According to Rankiteo, Nordstrom’s AI-generated cybersecurity score is 774, reflecting their Fair security posture.
According to Rankiteo, Nordstrom currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Nordstrom is not certified under SOC 2 Type 1.
According to Rankiteo, Nordstrom does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Nordstrom is not listed as GDPR compliant.
According to Rankiteo, Nordstrom does not currently maintain PCI DSS compliance.
According to Rankiteo, Nordstrom is not compliant with HIPAA regulations.
According to Rankiteo,Nordstrom is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Nordstrom operates primarily in the Retail industry.
Nordstrom employs approximately 46,897 people worldwide.
Nordstrom presently has no subsidiaries across any sectors.
Nordstrom’s official LinkedIn profile has approximately 619,222 followers.
Nordstrom is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Nordstrom does not have a profile on Crunchbase.
Yes, Nordstrom maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nordstrom.
As of November 27, 2025, Rankiteo reports that Nordstrom has experienced 1 cybersecurity incidents.
Nordstrom has an estimated 15,252 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with measures taken to prevent future incidents..
Title: Nordstrom Data Breach
Description: A data breach involving Nordstrom, Inc. occurred due to improper handling of employee data by a contract worker, potentially affecting names, Social Security numbers, and other personal information.
Date Detected: 2018-11-05
Date Publicly Disclosed: 2018-11-05
Type: Data Breach
Attack Vector: Improper handling of employee data
Vulnerability Exploited: Human error
Threat Actor: Contract worker
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers, Other personal information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Other Personal Information and .

Entity Name: Nordstrom, Inc.
Entity Type: Retail
Industry: Retail
Location: California
Customers Affected: None

Remediation Measures: Measures taken to prevent future incidents

Type of Data Compromised: Names, Social security numbers, Other personal information
Sensitivity of Data: High
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Measures taken to prevent future incidents.
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Attorney GeneralDate Accessed: 2018-11-05.

Root Causes: Improper handling of employee data by a contract worker
Corrective Actions: Measures taken to prevent future incidents
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Measures taken to prevent future incidents.
Last Attacking Group: The attacking group in the last incident was an Contract worker.
Most Recent Incident Detected: The most recent incident detected was on 2018-11-05.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2018-11-05.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers, Other personal information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Other personal information, Social Security numbers and Names.
Most Recent Source: The most recent source of information about an incident is California Attorney General.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.