Follow Tweet This Facebook LinkedIn google+
Data Security

Yahoo’s user accounts hack a stark reminder of need for post-breach security risk strategies: Expert

Ryan Patrick, 4 days ago
Canada government sign

Shared Services Canada reaches out to ICT sector for help developing IT transformation mandate

Ryan Patrick, 5 days ago
quantum computing, data

Prepare for threat of quantum computing to encrypted data, Canadian conference told

Howard Solomon, 7 days ago
openworld1

Oracle maintains cloud-centric course as enterprise IT budgets remain flat

Gary Hilson, 1 week ago
The MERIDIAN initiative (Marine Environment Research Infrastructure for Data Integration and Application Network)at Dalhousie University was one several recipients of funding from the Canada Foundation for Innovation.

Latest round of CFI funding focuses on data-rich research

Gary Hilson, 1 week ago
teradata2

Teradata repositions itself as an analytics solution firm

Ryan Patrick, 2 weeks ago
78053730

U.S. Congressional report blames management for huge federal breach

Howard Solomon, 2 weeks ago
data, big data, network, code

How Toronto’s Buzz Indexes uses the power of machine learning to mine social media’s big data sets

Ryan Patrick, 3 weeks ago
Microsoft Cloud and Mobility solutions

Microsoft’s Wim Coekaerts on open source: “The days of a closed Microsoft are over”

Ryan Patrick, 1 month ago
graphic of data lock

Make this year’s Cyber Security Awareness Month a loud and personal campaign

Apple MacBook with retina display

Apple MacBooks get updated with MacOS Sierra

Chris Lau, 14 hours ago
rvh-kronos

Health centre improves employee satisfaction by eliminating the paper trail

Feature IT Authors

Yahoo’s user accounts hack a stark reminder of need for post-breach security risk strategies: Expert

Most makers of IoT devices still don’t explain how personal info is used: Report

Health centre improves employee satisfaction by eliminating the paper trail

How employees can be at risk from doxxing threats

Feature IT Content

Feature IT Videos

The Top 4 Data Security Best Practices

Ryan Patrick, 2 weeks ago

The Road to Agility: Survey Says We’re Not There Yet

Managing Security in the Cloud: CSO Digital Security Situations #1

Feature ITWC Talks Articles

When attackers hold your data hostage: Addressing today’s security threats

When attackers hold your data hostage: Addressing today’s security threats

Sponsored By: Cisco
71080359

Commerce Knowledge Hub: The CMO’s guide to analytics and more

Sponsored By: IBM
93920033

Failing to understand licensing agreements comes with a cost

Sponsored By: COMPAREX
Global cloud computing

Do hybrid cloud services deliver real value to Canadian businesses?

Sponsored By: Hewlett Packard Enterprise
Industry talking to customers Learn More
1x1