Predictions from PandaLabs

Panda-Labs-security software-predictions

PandaLabs has long been one of the most trusted names in computer security, providing reliable cloud-based protection to both enterprises and individuals for a generation. Used as a model for multiple similar cloud-based startups over the last decade, the venerated Panda security suite remains one of the most-downloaded anti-viral and anti-malware suites in existence, and [...] Read more »

Data Protection During the holidays

Key with christmas tree

The Holiday season is upon us, and most people will spend significantly more time traveling over the next month than they did for the rest of the year. The hours spent in airports on the way to visit family, friends, and loved ones, as well as massive increases in online shopping, both ramp up the [...] Read more »

BYOD Implementation: A Primer

BYOD mobile security

Bring Your Own Device – rarely in history has there been a string of four words that strikes so much fear and anxiety into the heart of dedicated IT security managers everywhere. BYOD policies are increasingly common across the corporate landscape. Companies both foreign and domestic have weighed the costs of purchasing new devices and [...] Read more »

Dirty Business

security breaches at work

Antivirus software developer ThreatTrack Security published a survey in October that provides several startling statistics on the state of cybersecurity nationwide. While the high incidence of unreported breaches has already been covered in this week’s Eye-Popping Stat, ThreatTrack uncovered a variety of workplace misadventures that affect a surprising number of large companies. Uncovering a statistic [...] Read more »

Diverging Paths on Mobile Security

mobile device security

In a recent press release, Gary Kovacs, the new CEO of global security software company AVG, pinpointed the root cause of a great many security issues concerning mobile device technology. As the former head of Mozilla, Kovacs is not averse to shaking up industry expectations and unapologetically pointing fingers. True to form, the picture Kovacs [...] Read more »

Making the Grade

gartner IT consulting

It’s time now to look back at a series of predictions made by Gartner, a global leader in information and technology research. Regular readers of Data Security Weekly will note that Gartner is an oft-used source of reports and metrics in our articles and broadcasts, and is generally considered one of the more reliable institutions [...] Read more »

Making Choices on BYOD

bring your own mobile device

Business and technology news site InformationWeek has just released their latest MUST READ compendium, a collection of stories that provide compelling and insightful analysis of tech industry trends. Chief among these stories is one we here at DSW also find interesting – the tech surrounding mobile device virtualization, and the three primary ways software companies [...] Read more »

Black Hats in Vegas

black hat security conference

For 16 years now, the Black Hat Conference in Las Vegas has set the standard for data security conferences across the US. IT security professionals and software vendors from around the globe converge on Las Vegas to discuss the largest, most interesting, and most terrifying threats emerging in the wild, and to provide both a [...] Read more »

Taking Responsibility for your Data

An Australian survey conducted by Newspoll in Q2 of this year uncovered an interesting trend in the views of the public regarding mobile device data protection – views that are all too often mirrored on this side of the Pacific. Of the 1,200 Australian and New Zealand residents queried, 80% of respondents felt that service [...] Read more »

Should FTC Powers Include Cyber Security Mandates?

The Federal Trade Commission made a brave move last Friday in announcing a joint settlement with noted mobile device producer HTC America. In an effort to ensure ongoing protection of consumer data, this settlement compels HTC to develop a series of solutions intended to shore up the security holes presently peppering many of the devices [...] Read more »

Next Page »