The final post in our three-part series puts complex jargon about data breaches in plain language to educate senior management about the threats they face
Read post
The next post in our three-part series puts complex jargon about data breaches in plain language to educate senior management about the threats they face
Read post
We begin a three-part series that IT professionals can use to demystify data protection to the CEO, the board and other stakeholders
Read post
Digital disruptions has made the perimeter for merchants wider than ever before, but IT leaders are starting to stock up on some solid defence strategies
Read post
A 1.5-minute clip shows the basics of outlining a professional background in running critical parts of enterprise IT. But there is always room for improvement
Read post
A recent report shows why and how we are increasingly dupes into taking a course of action that directly leads to IT security being breached
Read post
Our monthly roundup of the best discussions on the online community, from phishing attacks to protecting your network from disgruntled techies.
Read post
Analytics, algorithms and behavioural modeling can spot anomalies and potential fraud. But that’s just the beginning
Read post
The hacker attack on Sony Pictures Entertainment changed the way companies think about security. Now it’s time to develop a true defence-in-depth strategy
Read post
John Chambers launches the firm’s mid-year security report with suggestions that we need to work better together as the Internet of Things takes shape
Read post
Meet CloudMask, an Ottawa company whose tokenization technology may be one of the best ways to mitigate the effects of insider threats
Read post
Cybercriminals are moving beyond mere hacking to extort money from their victims. Paying up, however, could be a big mistake
Read post
A recent panel at SC Congress brings together public sector IT security executives to talk about how their role is evolving
Read post
At the recent SC Congress event, Dave Lewis provided helpful advice on IT security with a touch of humour woven in
Read post
If the Department of Homeland Security struggles to attract the kind of talent it needs, what chance do firms here have?
Read post
A research report predicts customers will increasingly want to use their bodies to access financial data. The researcher outlines some important next steps
Read post
A rise in cyber-security attacks, worries about the Internet of Things and other topics at one of the industry’s major security gatherings
Read post
The annual event in Vancouver is the place to learn how to avoid major IT security incidents. If you didn’t make it, we have you covered
Read post
The best technology works so well you barely notice it. Cyber-criminals, however, don’t miss a thing.
Read post
A Gartner Inc. analyst suggests trust and individual accountability may be a better way to protect data than restrictive policies
Read post
A new report tabulates expenses for small and medium-sized businesses that experience cyber attacks – and the results aren’t pretty.
Read post
An event at Toronto Region Board of Trade focuses on how best to protect corporate data amid a growing list of potential threats
Read post
IDC Canada data suggests there are still a lot of organizations under-investing in mobile security. Think through the long-term repercussions
Read post
The recent White House Cybersecurity Summit introduced an interesting approach to teamwork among industries that’s worth exploring in Canada
Read post
Enterprises are no doubt wondering what will hit them next. Here’s a handful of answers about what’s possible
Read post