Most popular

News about IT management
Features about IT management
  • Think Deleted Text Messages Are Gone Forever? Think Again

    By Tom Kaneshige | 11 March, 2014 20:20

    A former federal prosecutor and cybercrime expert tells CIO.com how IT departments can retrieve text messages that the user thought were deleted months or even years ago. As more litigation and investigations turn on the content of texts, every CIO needs to know how to find the smoking gun.

  • 12 hot US security start-ups to watch

    By Ellen Messmer | 13 November, 2013 13:23

    Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.

  • In wake of BlackBerry's demise, CIOs look to Samsung, Apple and Microsoft

    By Tom Kaneshige | 04 November, 2013 17:29

    BlackBerry's fall means CIOs must quickly develop a new mobile strategy. The big three of enterprise mobility are familiar names -- Apple, Samsung and Microsoft. Who will win out?

  • Tips for testing your mobile app security

    By Michelle Drolet, founder of Towerwall | 20 June, 2013 22:35

    The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.

  • 5 BYOD pitfalls and how you can avoid them

    By Tom Kaneshige | 20 June, 2013 00:25

    Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.

Whitepapers about IT management

  • Agile Software Development and the Factors that Drive Success

    The digital revolution continues to destroy firms that don’t anticipate market shifts quickly enough to leverage new opportunities and avoid new pitfalls. The need for business agility is driving the Agile movement in software development — and continuous improvement is at the heart of the movement. In this Forrester study, we look at the the intuitive and counter-intuitive data points surrounding the commonly held beliefs about the Agile development tenants that guide the day-to-day behaviour of development team members. Click to download.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Webroot Web Security

Proactive web security that blocks threats in the cloud before they reach users’ machines, or enter customers’ networks.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.