Follow Tweet This Facebook LinkedIn google+
Data Breach Graphic

Yahoo put user experience, new products over security, says news report

Howard Solomon, 3 hours ago
Ofoffice women in IT, workers, Microsoft

ISACA encourages women in IT to share success stories, leadership

Howard Solomon, 4 hours ago
quantum computing, data

Prepare for threat of quantum computing to encrypted data, Canadian conference told

Howard Solomon, 1 week ago
Canada IT Strategic Plan header

IBM Canada points finger at Conservatives over Phoenix payroll training: CBC

Howard Solomon, 51 mins ago
Image by Daoleduc via GettyImages.ca

The latest ransomware trends call for urgent defence measures

Cindy Baker, 1 hour ago
cracked-apple

Is the world ready for a jack-less iPhone? Apple seems to think so

Don Sheppard, 4 hours ago
97739527

ITAC calls on Ottawa to do more to support ICT sector

Howard Solomon, 5 hours ago
data, network, database

UWaterloo adds research chair into data cleansing

Howard Solomon, 15 hours ago
devops-culture

Cloud is at the heart of digital transformation, make sure DevOps is too

Gary Hilson, 1 day ago
Feature John Chen BlackBerry CEO

BlackBerry to stop designing, making its own devices – focus pivots to software

SAP webinar

Artificial intelligence: good, evil, or just a great business tool?

Dave O'Leary, 1 day ago
Illustration of a keyboard with China flag

Ex-CSIS official backs Canada’s attempt to get cyber promise from China

Feature IT Authors

Yahoo’s user accounts hack a stark reminder of need for post-breach security risk strategies: Expert

IBM Canada points finger at Conservatives over Phoenix payroll training: CBC

Cloud is at the heart of digital transformation, make sure DevOps is too

How employees can be at risk from doxxing threats

Feature IT Content

Feature IT Videos

The Top 4 Data Security Best Practices

Ryan Patrick, 2 weeks ago

The Road to Agility: Survey Says We’re Not There Yet

Managing Security in the Cloud: CSO Digital Security Situations #1

Feature ITWC Talks Articles

Image by Brilt from Thinkstock.com

Online Fraud: Why Passwords Aren’t Enough

Sponsored By: Telus
When attackers hold your data hostage: Addressing today’s security threats

When attackers hold your data hostage: Addressing today’s security threats

Sponsored By: Cisco
71080359

Commerce Knowledge Hub: The CMO’s guide to analytics and more

Sponsored By: IBM
93920033

Failing to understand licensing agreements comes with a cost

Sponsored By: COMPAREX
Industry talking to customers Learn More
1x1