Thor Olavsrud

Senior Writer

Thor Olavsrud covers IT security, big data, open source technology, Microsoft tools and servers for CIO.com. He resides in New York.

Security-as-a-service model gains traction

9 biggest information security threats through 2019

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

Fraud rises as cybercriminals flock to online lenders

Fraud rises as cybercriminals flock to online lenders

The latest quarterly ThreatMetrix Cybercrime Report shows 1 million cyberattacks targeted online lending transactions throughout 2016, causing estimated losses of more than $10 billion.

Why you need a data protection officer

Why you need a data protection officer

Enforcement of the European Union's General Data Protection Regulation (GDPR) is set to start in about 18 months, giving regulators the ability to levy massive fines. Getting ready may require a data protection officer

Security tops app services priority list

Security tops app services priority list

Organizations are increasingly deploying application services to keep their applications humming, and for the first time, they are prioritizing security services over availability services.

4 information security threats that will dominate 2017

4 information security threats that will dominate 2017

Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2017, information security professionals must understand these four global security threats.

What is MANRS and does your network have it?

What is MANRS and does your network have it?

The Internet Society's Mutually Agreed Norms for Routing Security (MANRS) initiative is designed to provide measures to improve the resilience and security of the internet's routing infrastructure to keep it safe for businesses and...

How to protect your mission-critical information

How to protect your mission-critical information

A new report by the Information Security Forum (ISF) outlines the steps you can take to determine your mission-critical information assets &and create customized plans for protecting them.

Security an afterthought in connected home, wearable devices

Security an afterthought in connected home, wearable devices

In a survey of publicly reported vulnerabilities for consumer connected-home and wearable technology products between November 2015 and July 2016, the nonprofit Online Trust Alliance found that all of potential problems could have...

How blockchain will disrupt your business

How blockchain will disrupt your business

There are still challenges to overcome, but blockchain technology stands poised to rewrite how business is conducted if its potential is achieved. Are you ready?

5 security practices hackers say make their lives harder

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

Connected medical device makers need to step up security

Connected medical device makers need to step up security

The internet of things (IoT) shows huge promise in the healthcare sector, but there are serious security implications. Device manufacturers need to do more to secure devices and hospital CIOs need to demand better security.

Load More