Retail, Data Security, and Smart Cards

Shopping trolley on button of computer keyboard

Speculation is plentiful throughout the tech sector following a report Friday night from Neiman Marcus. According to the retail giant, they’ve suffered a huge data breach that affects untold thousands of credit card customers. As of this writing, no definitive number has been provided by either Neiman Marcus representatives or credible news agencies, but with [...] Read more »

The Future of Data Security

future data security

With our first editorial of the new year, it makes sense to take a look forward at the emerging trends in the IT sector in an effort to map out where the next phase in the evolution of data security is going to take us. The recent breaches against Adobe, Target, LivingSocial, and SnapChat directly [...] Read more »

Target, the FTC, and Consumer Data

ftc and target data breach

The Target breach last week is still big news, as the central cause of the entire affair was found to be a malware injection that granted access to payment processing servers. The servers have since been purged, and Target handed out discounts to last minute Christmas shoppers as an apology for the hassle. Target representatives [...] Read more »

A Black Hole in the Internet?

BGP global security threat

If you’ve read any tech blogs lately, chances are you’ve encountered numerous stories concerning the recent discovery of massive data interceptions utilizing Border Gateway Protocol. Also variously referred to as the “Internet’s biggest security hole, the “Black hole” exploit, or “BGP syphoning,” we’re going to take a pragmatic look at this new security problem and [...] Read more »

Data Security is Everyone’s Business

business data security

In light of recent data attacks against major portions of the economy – ranging from the health sector to education to finance – we here at DSW are consistently flabbergasted with how many enterprises exist that still do not have a comprehensive data security plan in place. Not only is poor or non-existent data security [...] Read more »

Dirty Business

security breaches at work

Antivirus software developer ThreatTrack Security published a survey in October that provides several startling statistics on the state of cybersecurity nationwide. While the high incidence of unreported breaches has already been covered in this week’s Eye-Popping Stat, ThreatTrack uncovered a variety of workplace misadventures that affect a surprising number of large companies. Uncovering a statistic [...] Read more »

Unhealthy Data Security

unhealthy data security

Depending on who you talk to,, the Health and Human Services website designed to facilitate the upcoming Affordable Care Act changeover, cost us somewhere between $250 and $600 million dollars. While this price tag certainly reflects a tremendous amount of work that may not be immediately apparent – proprietary database construction, software development, and [...] Read more »

The Blame Game

It security blame game

It’s a sad but true fact that corporate America loves to play the blame game, and many an IT Manager has been called on the carpet to answer for mistakes made higher up the food chain. While assigning blame does have value – it can help us root out a problem with a specific vendor, [...] Read more »

NIST Revisited

NIST cybersecurity risk

Last week, we reported on the effects of the government shutdown on the National Institute of Standards and Technology – the federal agency tasked with building the framework for the President’s cybersecurity initiative – and how closing down the NIST and furloughing its employees was not only irresponsible, but defied the rules laid out in [...] Read more »

The Great LinkedIn Lawsuit

Linkedin data security lawsuit

A previously dismissed lawsuit against LinkedIn has once again emerged in the news, as Khalilah Wright – the sole remaining plaintiff in what was once a class action complaint – has pivoted her litigation around a new claim that the social media giant used outdated and obsolete data security measures. The story so far: a [...] Read more »

Next Page »