Stories by Thor Olavsrud

Chinese Government's Link to Cyber Espionage Clearer Than Ever

It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.

Written by Thor Olavsrud20 Feb. 13 16:09

Certificate Authorities Form Group to Educate on SSL Best Practices

Responding to the increasing number of threats aimed at certificate authorities and the ecosystem of trusted online transactions they represent, seven certificate authorities have come together to form an advocacy group to advance security standards and promote best practices.

Written by Thor Olavsrud15 Feb. 13 17:45

FIDO Alliance Says, 'Forget Passwords!'

If there's one thing that's become clear in the past several years, according to PayPal CISO Michael Barrett, it's that usernames and passwords--originally conceived in the era of centralized mainframes--have become more of a liability than a protection online.

Written by Thor Olavsrud12 Feb. 13 19:40

Is Stolen IP Walking in the Door With New Employees?

Are your former employees walking out the door with your intellectual property? And worse, is your new hire putting your organization at risk by bringing in IP stolen from a former employer? A new global survey by Symantec and The Ponemon Institute finds that half of employees who left or lost their jobs in the past 12 months kept confidential corporate data, and 40 percent say they plan to use the data in their new jobs.

Written by Thor Olavsrud08 Feb. 13 15:35

PCI Council Releases Guidelines for Cloud Compliance

A new set of guidelines from the PCI Security Standards Council is intended to help merchants and cloud services providers comply with the PCI DSS when handling payment card data on the web.

Written by Thor Olavsrud07 Feb. 13 16:23

Big Data Startup Attracts Fortune 100 Clients, Venture Capital

Everybody is talking about Big Data, but planning and implementing a Big Data project can be a daunting affair. Enter Think Big Analytics, a vendor-neutral services provider that aims to help large enterprises plan Big Data projects, train staff and then implement.

Written by Thor Olavsrud05 Feb. 13 15:42

Malware Strikes With Valid Digital Certificate

One of the foundational elements of ecommerce is the web of trust enabled by digital certificates. When you go to a web site, you can feel confident that it's legitimate because it has a certificate from a recognized certificate authority that validates it. But the certificates themselves can be vulnerable. Case in point: Security firm Malwarebytes recently discovered some malware in the wild with a valid, signed digital certificate.

Written by Thor Olavsrud05 Feb. 13 00:32

How BYOD saved VMware $US2 million

As more companies adopt a bring-your-own-device (BYOD) approach to mobile, many are getting caught by hidden costs. But virtualization titan VMware has bucked that trend. VMware CIO Mark Egan explains how his company accomplished its feat.

Written by Thor Olavsrud01 Feb. 13 15:20

6 hidden costs of cloud and how to avoid them

It should come as no surprise at this point that organizations of all sizes are flocking to the cloud with high hopes of reducing CapEx, making OpEx more predictable, enhancing scalability, making management easier and improving disaster preparedness. In fact, here in the opening weeks of 2013, a new study by Symantec finds that 94 percent of enterprises are at least discussing cloud or cloud services, up from 75 percent a year ago. But Symantec also reports that companies that rush into cloud deployments inevitably encounter a host of hidden costs.

Written by Thor Olavsrud17 Jan. 13 19:53

EMC Offers Online File Sharing With On-Premise Storage Product

EMC is building on its acquisition of the Syncplicity file-sharing and collaboration service by combining it with its Isilon scale-out NAS to provide the enterprise what the storage giant claims provides the convenience of a cloud-based file-sharing service with the administrative and governance capabilities of an on-premise solution.

Written by Thor Olavsrud15 Jan. 13 14:18

How to Use Big Data to Make Faster and Better Business Decisions

Big Data is clearly a disruptive technology, but using it successfully is as much art as it is science. The key is integrating Big Data with traditional BI to create a data ecosystem that allows you to generate new insights while executing on what you already know.

Written by Thor Olavsrud11 Jan. 13 14:21

Mobile attacks top the list of 2013 security threats

For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?

Written by Thor Olavsrud09 Jan. 13 14:25

How to Get a Grip on Data With 'Information Superiority'

To make more efficient use of data and improve data protection, take a holistic approach to information governance-one that focuses attention on the most sensitive data while removing impediments to sharing.

Written by Thor Olavsrud03 Jan. 13 17:43

Top 12 Security Slideshows of 2012

As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.

Written by Thor Olavsrud24 Dec. 12 14:14
[]