Black hat hackers that penetrate your organization and steal sensitive information like customers' credit card data are a serious threat. But some of the most dangerous hackers in the world aren't after your money; they want to steal the way your business makes money.
New Private IP Wireless (LTE) service to let businesses create IP VPNs that span and integrate wired and wireless networks.
Free and open source software (FOSS) have become pervasive in computing over the past 25 years.
When you think Big Data, products such as QuickBooks and TurboTax may not spring to mind.
With an eye to the threat horizon several years out, organizations can no longer afford to leave responsibility for managing security risks at the door of the information security department.
Google yesterday cut the cost of Google Cloud Storage--a service geared to enabling developers to store and access massive amounts of data.
Many organizations have now gone so far as to dip their toes into the shallow end of cloud computing, and many more are thinking about testing the waters.
SSL certificates are a fundamental component of secure online transactions, but a new survey finds that a majority of organizations don't know where or how many certificates they actually have, and nearly as many lack an accurate idea of which certificates are about to expire.
Criminals in 2012 are increasingly targeting the accounts of business owners and executives as a way to facilitate financial fraud.
As organizations increasingly adopt cloud offerings for critical business operations from public and private providers, connecting them all back to the core of the business is becoming a challenge involving complicated integration, orchestration and rules management.
Articles by Thor Olavsrud