The popular network admin online community is talking about the “won’t happen to me” security syndrome, women in IT and more
Read post
Research from Cisco and IDC suggests that firms here shouldn’t be complacent about their ability to protect data
Read post
What kind of chief information security officer would suggest that a key portion of his role includes “making friends?” Jamie Rees, that’s who
Read post
Bad mental habits can inhibit innovation. How thinking like Houdini can help CIOs find a way out of constraints
Read post
Unstructured information needs to be protected, but the most-hyped tool that manages it has some pros and cons. Consider these five critical steps
Read post
Big data is on everyone’s radar and that was no different at day one of the Dx3 conference in Toronto. Marketers, agencies and IT departments unite with their big needs to make sense of all this data.
Read post
[White Paper] Protect Your Business – 10 Steps to Early Incident Detection
Read post
Many businesses are talking about moving to the new addressing system, but no one wants to deal with downtime as a result. Check out a resource that can help offer some business continuity advice
Read post
A CTO explains why most organizations are only managing to catch the lower-level hackers, and why more advanced skills will become an obvious need in 2013.
Read post
The market research firm makes its annual forecast of what will be the biggest technologies and trends for the coming 12 months, including a trio of familiar topics
Read post
An Arbor Networks security researcher talks about how ‘hacktivists’ are showing IT departments they’re systems are not as iron-clad as they may think
Read post
VIDEO: First of a seven-part multimedia conversation about distributed denial of service and what IT departments can do
Read post
Here’s a roundup of today’s IP news:
The 2012 Gartner CIO survey revealed that global spending on security will reach $60 billion this year, representing an 8.4% increase from last year. By 2016, global security spending will increase to $86 billion. According to the study, the...
Read post
Post #3: The Conversation About Customer Service
Read post
[McAfee White Paper] Security Connected: Optimize Your Business
Read post
Although virtualization can pose a number of security challenges—such as increasing network complexity and developing new avenues of attack—it can also create opportunities for improved security. InformationWeek’s Next-Generation VM Security report states that “virtual software appliances...
Read post
[White Paper] Conquering Today’s BYOD Challenges Aruba Networks
Read post
When it comes to securing virtual and cloud environments, many security technologies require new platforms to support virtualization. One technology that has received a makeover to support virtualization and cloud is intrusion prevention (IPS).
Read post
An Intel survey confirmed the important role that security plays when it comes to choosing both public and private cloud services. Security either formed the foundation of respondent’s decisions or played a strong role in their selection of a cloud deployment model. Here’s what the...
Read post
A report released by Symantec revealed that the Internet security company blocked 5.5 billion malicious attacks in 2011, an increase of 81% from the previous year. The latest annual Internet Security Threat Report stated that the increase in attacks was due in part to the increased use of advanced...
Read post
VDI can keep your employees happy by allowing them to use their favourite devices. However, it also poses a number of challenges.
Read post
On May 8, 2012, Allstream’s Secure Connect service won SC Magazine's award for the Best Managed Security Service in Canada.
Secure Connect provides secured Internet connectivity on private data networks and protects organizations from distributed denial of service (DDoS) attacks that can...
Read post
This easy-to-follow diagram illustrates how SIP trunking transforms your network while delivering business and IT gains across your organization.
Read post
More businesses are looking at virtualization as a way to build internal cloud infrastructures. However, server consolidation security risks prevent many from implementing virtualization – partly because the security controls developed for physical environments don’t translate directly to...
Read post
A growing number of businesses are allowing employees to use their personal mobile devices to access the corporate network. This means they must put security measures in place to protect their networks from the two biggest threats.
Read post