Thor OlavsrudSenior Writer, CIO Follow me on Google+

Thor Olavsrud covers IT security, big data, open source technology, Microsoft tools and servers for CIO.com. He resides in New York.

Cloud Apps

How to evaluate moving legacy mission-critical apps to the cloud

The flexibility and scalability of the cloud can make migrating mission-critical applications a tempting proposition, but availability can become a serious issue.

Social sites beat retailers and banks for consumer protection and privacy

For the second year in a row, social media sites (including gaming and dating sites) are leading the way in consumer security and privacy protections, beating out Internet retailers and banks, according to an annual comprehensive audit by the Online Trust Alliance (OTA).

Signature-Based Endpoint Security on Its Way Out

Signature-based blacklisting security technologies are losing the battle against malware, says McAfee, which has streamlined its endpoint security offerings to two suites that it says provide next-generation security for all endpoints, whether PCs, tablets or ATMs.

Google Glass: simply a gimmick or a game-changer in business?

Is Google Glass a gimmick or the next revolution in post-PC computing? Time will be the judge, because the head-mounted augmented reality device isn't even widely available yet.

on techhive.com

How to defend against malnets

Since 2011, security firm Blue Coat Systems has been tracking malnets: extensive distributed network infrastructures embedded in the Internet and designed to deliver mass-market attacks on a continuous basis. These malnet infrastructures are like the proverbial Lernaean Hydra--chop off one head, like a botnet it has produced, and two more spring up to take its place.

Intuit opens financial data service APIs to developers

Hoping to unleash a wave of developer creativity in financial apps, Intuit is giving developers access to the financial data service that powers Quicken, QuickBooks and Mint.com.

VMware CEO Paul Maritz Leaves Behind a Vision of IT Transformation

Friday marks the end of an era, as outgoing VMware CEO Paul Maritz hands the reins to incoming CEO Pat Gelsinger.

How to Secure Data by Addressing the Human Element

Your sensitive data is only as secure as the weakest link in your organization, and in many cases the weak link is your employees.

How to Secure Sensitive Files and Documents

Are you doing enough to secure your organization's sensitive information?

For BYOD Best Practices, Secure Data, Not Devices

IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.

Do Customers Share Blame in Amazon Outages?

A number of high-profile Amazon Web Services (AWS) outages temporarily brought down services by customers like Netflix and Pinterest in June.

10 Mobile Device Management Apps to Take Charge of BYOD

Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today.

Data Protection Officer Role Will Be Key If You Operate in the EU

The European Union is considering sweeping new data protection laws that would mandate many organizations in Europe formally appoint a Data Protection Officer (DPO). To get ahead of the potential high demand for qualified candidates, organizations should consider defining their needs now.

Are You Prepared for the EU's New Data Protection Regulation?

Big changes are coming to data protection laws in the European Union. Are you ready?

Targeted Attacks Increased, Became More Diverse in 2011

The latest Internet Security Threat Report by Symantec finds that targeted attacks are becoming more common and are going beyond the public sector and large enterprises to smaller, less well defended companies in the supply chain and partner ecosystem.