Stories by Thor Olavsrud

How Big Data Analytics Can Help Track Money Laundering

For the past decade, governments around the world have established international anti-money laundering (AML) and counter-terrorist financing efforts in an effort to shut down the cross-border flow of funds to criminal and terrorist organizations. Their success has encouraged criminals to move their cash smuggling away from the financial system to the byzantine world of global trade. According to PwC US, big data analytics are becoming essential to tracking these activities.

Thor Olavsrud | 21 Jan | Read more

11 Steps Attackers Took to Crack Target

Despite the massive scale of the theft of Personal Identifiable Information (PII) and credit card and debit card data resulting from last year's data breach of retail titan Target, the company's PCI compliance program may have significantly reduced the scope of the damage, according to new research by security firm Aorato, which specializes in Active Directory monitoring and protection.

Thor Olavsrud | 02 Sep | Read more

How IT can establish better cloud control

Employees who use software-as-a-service (SaaS) applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behaviour and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control.

Thor Olavsrud | 25 Feb | Read more

How to Bring Shadow IT Under Control

Most business units these days are leveraging cloud services, and a majority of them are bypassing IT to do it, according to a new study. While many IT departments want to take charge of provisioning cloud services, it may make more sense to get your arms around compliance and governance first.

Thor Olavsrud | 16 Jan | Read more

Most Data Breaches Caused by Human Error, System Glitches

When it comes to data breaches, hackers and organized crime garner most of the headlines, but most data breaches are caused by human errors and system glitches--application failures, inadvertent data dumps, logic errors in data transfer and more. As a result, educating your employees and making sure they're not cutting corners is a big component in preventing data breaches.

Thor Olavsrud | 17 Jun | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place