Thor OlavsrudSenior Writer, CIO Follow me on Google+

Thor Olavsrud covers IT security, big data, open source technology, Microsoft tools and servers for CIO.com. He resides in New York.

The Most Dangerous Hackers Want to Steal How You Make Money

Black hat hackers that penetrate your organization and steal sensitive information like customers' credit card data are a serious threat. But some of the most dangerous hackers in the world aren't after your money; they want to steal the way your business makes money.

Verizon's IP VPN Opens a New World of Wireless Possibilities

New Private IP Wireless (LTE) service to let businesses create IP VPNs that span and integrate wired and wireless networks.

Why Open Source Is the Key to Cloud Innovation

Free and open source software (FOSS) have become pervasive in computing over the past 25 years.

Intuit Brings Big Data to Small Businesses and Consumers

When you think Big Data, products such as QuickBooks and TurboTax may not spring to mind.

IT Must Change Security Strategies to Keep Up With Cybercriminals

With an eye to the threat horizon several years out, organizations can no longer afford to leave responsibility for managing security risks at the door of the information security department.

Google Cloud Storage Cuts Prices, Integrates With Tech Providers

Google yesterday cut the cost of Google Cloud Storage--a service geared to enabling developers to store and access massive amounts of data.

How to Choose Your Cloud Service Provider

Many organizations have now gone so far as to dip their toes into the shallow end of cloud computing, and many more are thinking about testing the waters.

Inadequate SSL Certificate Data Threatens IT Security

SSL certificates are a fundamental component of secure online transactions, but a new survey finds that a majority of organizations don't know where or how many certificates they actually have, and nearly as many lack an accurate idea of which certificates are about to expire.

8 Tips to Defend Against Online Financial Fraud Threats

Criminals in 2012 are increasingly targeting the accounts of business owners and executives as a way to facilitate financial fraud.

Forget Public Cloud or Private Cloud, It's All About Hyper-Hybrid

As organizations increasingly adopt cloud offerings for critical business operations from public and private providers, connecting them all back to the core of the business is becoming a challenge involving complicated integration, orchestration and rules management.