Content about Computer network security

April 18, 2014

If retailers want to address credit card breaches head-on, then they need to join the leaders already taking their systems off the radar of advanced malware based attacks — especially any retailer that's seen repeated attacks, which illustrate that traditional IT defenses simply don't cut the mustard.

By Mark Bower, Voltage Security

March 17, 2014

When preventing the type of data breaches that have recently gotten the names of several major retailers in the news for all the wrong reasons comes up, the discussion focuses almost exclusively on what type of technology should be employed to prevent them.

When preventing the type of data breaches that have recently gotten the names of several major retailers in the news for all the wrong reasons comes up, the discussion focuses almost exclusively on what type of technology should be employed to prevent them. IT is certainly a cornerstone of any retailer’s data security defense, but as explained in a Tech Boot Camp session at Chain Store Age’s 50th annual SPECS conference, a dose of common sense also goes a long way toward preventing unwanted visitors from entering your company’s network.

March 6, 2014

Sally Beauty Holdings Inc., which sells cosmetics and hair care products both through salons and its own chain of more than 3,000 retail Sally Beauty Supply stores globally, is reporting that it discovered an attempted data breach.

Denton, Texas – Sally Beauty Holdings Inc., which sells cosmetics and hair care products both through salons and its own chain of more than 3,000 retail Sally Beauty Supply stores globally, is reporting that it discovered an attempted data breach.

February 6, 2014

Increasingly, commercial heating, ventilation and air-conditioning (HVAC) and other building management systems in retail stores are connected to the Internet. And as recent events have shown, such systems (often called “smart systems”) also raise big security implications.

By Dwayne Melancon, chief technology officer, Tripwire

January 27, 2014

Secure data vault provider CertainStore is rolling out of a cybersecurity solution utilizing its proprietary micro-encryption/micro-tokenization technology to prevent the re-occurrence of recent malicious attacks on customer data.

Colorado Springs, Colo. – Secure data vault provider CertainStore is rolling out of a cybersecurity solution utilizing its proprietary micro-encryption/micro-tokenization technology to prevent the re-occurrence of recent malicious attacks on customer data.

January 15, 2014

Yet again, the attackers have gained access to sensitive data. The industry has to understand that incomplete approaches to protecting data that leave it exposed at some vulnerable point in its life will result in a breach. It's merely a matter of time.

By Mark Bower, VP, Voltage Security

December 2, 2013

Akamai Technologies and Prolexic Technologies have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise IP applications from distributed denial of service (DDoS) attacks.

Cambridge, Mass. -- Akamai Technologies and Prolexic Technologies have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise IP applications from distributed denial of service (DDoS) attacks.

July 25, 2013

Five individuals have been charged with running a sophisticated, worldwide hacking organization that the U.S. Department of Justice called the largest hacking and data breach scheme ever prosecuted in the United States. The victims in the scheme included such retailers as J.C. Penney, 7-Eleven Inc., Carrefour and Hannaford Brothers Co.

New York -- Five individuals have been charged with running a sophisticated, worldwide hacking organization that the U.S. Department of Justice called the largest hacking and data breach scheme ever prosecuted in the United States. The victims in the scheme included such retailers as J.C. Penney, 7-Eleven Inc., Carrefour and Hannaford Brothers Co. 

August 22, 2011

While retailers continue to beef up computer security, hackers continue to find ways to circumvent even the most sophisticated cyber-blockades. And the threat is not only hackers or rogue employees maliciously liberating private information: Data breaches occur when sensitive information is improperly disposed of and tossed in the trash or lost when a laptop or other portable electronic device is mislaid by or stolen from a well-meaning employee. This not only impacts your customers but can damage a company’s reputation and bottom line.


April 30, 2008

“Wow!” That was my exact reaction when I read that Hannaford Bros. became the...

December 31, 2007

The race is on between companies that secure retail networks and hackers who compromise...

November 30, 2007

To comply with the Payment Card Industry’s (PCI) security standards for wireless environments, the Navy...

June 30, 2007

The 2010 Winter Olympics may seem far away, but Vancouver officials are wasting no time...

January 31, 2007

In spring 2006, Ohio University (OU) discovered that it was the victim of five security...

December 31, 2006

Data breaches have become an unavoidable cost of doing business in the 21st century.All companies—including...

August 23, 2005

Newton, Mass., Retail...

August 7, 2005

New York City, ...