In Pictures: Seven best practices for Cloud security
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
27 May | View galleries
Microsoft's Windows Server 2003 has its Windows XP moment coming very soon, and that's bad news for IT leaders who have been dragging their feet.
Blair Hanley Frank | 11 Jul | Read more
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
Ryan Francis | 27 May | Read more
Oracle has issued a comprehensive list of its software that may or may not be affected by the OpenSSL (secure sockets layer) vulnerability known as Heartbleed, while warning that no fixes are yet available for some likely affected products.
Chris Kanaracus | 17 Apr | Read more
Just before the Christmas holiday, CSO offered five strategies the help mitigate post-holiday BYOD problems. Now that employees are returning to work, shiny new devices in hand, here's some additional insight.
Steve Ragan | 02 Jan | Read more
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
Juan Carlos Perez | 05 Dec | Read more
THE GREAT LOG COLLECTION DEBATE Many organizations put their SIEM at the center of their log collection, archiving and analysis model. But when combined with a couple of hard facts and an inconvenient truth, this model often leads organizations to make the potentially catastrophic choice not to collect all their log data. Here’s how the reasoning frequently goes.