Follow Tweet This Facebook LinkedIn google+
Data Security

Yahoo’s user accounts hack a stark reminder of need for post-breach security risk strategies: Expert

Ryan Patrick, 3 days ago
Canada government sign

Shared Services Canada reaches out to ICT sector for help developing IT transformation mandate

Ryan Patrick, 4 days ago
quantum computing, data

Prepare for threat of quantum computing to encrypted data, Canadian conference told

Howard Solomon, 6 days ago
openworld1

Oracle maintains cloud-centric course as enterprise IT budgets remain flat

Gary Hilson, 6 days ago
The MERIDIAN initiative (Marine Environment Research Infrastructure for Data Integration and Application Network)at Dalhousie University was one several recipients of funding from the Canada Foundation for Innovation.

Latest round of CFI funding focuses on data-rich research

Gary Hilson, 7 days ago
teradata2

Teradata repositions itself as an analytics solution firm

Ryan Patrick, 2 weeks ago
78053730

U.S. Congressional report blames management for huge federal breach

Howard Solomon, 2 weeks ago
data, big data, network, code

How Toronto’s Buzz Indexes uses the power of machine learning to mine social media’s big data sets

Ryan Patrick, 3 weeks ago
Microsoft Cloud and Mobility solutions

Microsoft’s Wim Coekaerts on open source: “The days of a closed Microsoft are over”

Ryan Patrick, 1 month ago
When attackers hold your data hostage: Addressing today’s security threats

When attackers hold your data hostage: Addressing today’s security threats

71080359

Commerce Knowledge Hub: The CMO’s guide to analytics and more

IT World Canada Staff, 2 days ago
cio collaboration

Workplace: Tearing down walls builds up collaboration

Feature IT Authors

Yahoo’s user accounts hack a stark reminder of need for post-breach security risk strategies: Expert

Most makers of IoT devices still don’t explain how personal info is used: Report

IT must communicate liabilities and consequences of technical debt

How employees can be at risk from doxxing threats

Feature IT Content

Feature IT Videos

The Top 4 Data Security Best Practices

Ryan Patrick, 1 week ago

The Road to Agility: Survey Says We’re Not There Yet

Managing Security in the Cloud: CSO Digital Security Situations #1

Feature ITWC Talks Articles

When attackers hold your data hostage: Addressing today’s security threats

When attackers hold your data hostage: Addressing today’s security threats

Sponsored By: Cisco
71080359

Commerce Knowledge Hub: The CMO’s guide to analytics and more

Sponsored By: IBM
93920033

Failing to understand licensing agreements comes with a cost

Sponsored By: COMPAREX
Global cloud computing

Do hybrid cloud services deliver real value to Canadian businesses?

Sponsored By: Hewlett Packard Enterprise
Industry talking to customers Learn More
1x1