Retail, Data Security, and Smart Cards

Shopping trolley on button of computer keyboard

Speculation is plentiful throughout the tech sector following a report Friday night from Neiman Marcus. According to the retail giant, they’ve suffered a huge data breach that affects untold thousands of credit card customers. As of this writing, no definitive number has been provided by either Neiman Marcus representatives or credible news agencies, but with [...] Read more »

The Future of Data Security

future data security

With our first editorial of the new year, it makes sense to take a look forward at the emerging trends in the IT sector in an effort to map out where the next phase in the evolution of data security is going to take us. The recent breaches against Adobe, Target, LivingSocial, and SnapChat directly [...] Read more »

Predictions from PandaLabs

Panda-Labs-security software-predictions

PandaLabs has long been one of the most trusted names in computer security, providing reliable cloud-based protection to both enterprises and individuals for a generation. Used as a model for multiple similar cloud-based startups over the last decade, the venerated Panda security suite remains one of the most-downloaded anti-viral and anti-malware suites in existence, and [...] Read more »

A Black Hole in the Internet?

BGP global security threat

If you’ve read any tech blogs lately, chances are you’ve encountered numerous stories concerning the recent discovery of massive data interceptions utilizing Border Gateway Protocol. Also variously referred to as the “Internet’s biggest security hole, the “Black hole” exploit, or “BGP syphoning,” we’re going to take a pragmatic look at this new security problem and [...] Read more »

Data Protection During the holidays

Key with christmas tree

The Holiday season is upon us, and most people will spend significantly more time traveling over the next month than they did for the rest of the year. The hours spent in airports on the way to visit family, friends, and loved ones, as well as massive increases in online shopping, both ramp up the [...] Read more »

Data Security is Everyone’s Business

business data security

In light of recent data attacks against major portions of the economy – ranging from the health sector to education to finance – we here at DSW are consistently flabbergasted with how many enterprises exist that still do not have a comprehensive data security plan in place. Not only is poor or non-existent data security [...] Read more »

NIST Revisited

NIST cybersecurity risk

Last week, we reported on the effects of the government shutdown on the National Institute of Standards and Technology – the federal agency tasked with building the framework for the President’s cybersecurity initiative – and how closing down the NIST and furloughing its employees was not only irresponsible, but defied the rules laid out in [...] Read more »

Black Hats in Vegas

black hat security conference

For 16 years now, the Black Hat Conference in Las Vegas has set the standard for data security conferences across the US. IT security professionals and software vendors from around the globe converge on Las Vegas to discuss the largest, most interesting, and most terrifying threats emerging in the wild, and to provide both a [...] Read more »

The Battle for Taiwan

taiwan hacking

Chinese cyber attacks have been on the rise for years, and a new battleground is taking shape to the east that may offer valuable insights into the strategies and tactics of both the underground and state sponsored styles of online warfare emerging from the People’s Republic. Taiwan has been a focal point of Chinese hacking [...] Read more »

A Clear Picture from Verizon

Verizon has just released the 2013 Data Breach Investigations Report, a collection of research and insight from 19 highly placed organizations around the world dedicated to understanding and preventing cyber attacks. A library of information, a host of predictions, and numerous calculated trend spotting strategies span the length of the 62 page report, and while [...] Read more »

Next Page »