Top IT Security Bloggers

The Ultra-Legacy Problem - Systems so old...

"That application is so old..." may sound like the start of a hilarious IT joke, but trust me if you've ever had to deal with one of these ultra-legacy systems - systems 10, 15, or more years old - then it's no laughing matter. In this post I'll discuss some of the issues with ultra-legacy systems...

Read the full article
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Secure Virtualization of Business Applications

Run your mission-critical applications in a secure and compliant virtual datacenter, or private cloud.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.