Image from Shutterstock.com

Dormant code in malware could be a problem, or a solution

In the ongoing battle between infosec pros and malware authors once thing is certain: Uncertainty. The bad guys are always...

August 28th, 2015 Howard Solomon
Feature-quantum-computing-Quantum-Information-Science-620x250

The ins and outs of cloud service level agreements

Are you concerned about managing cloud service level agreements (SLAs), and what impact they might have on your use of...

August 28th, 2015 Don Sheppard
Ashley Madison

What the Ashley Madison breach means

In the most recent of what seems to be a blizzard of high-profile hacks, infidelity Web site Ashley Madison had the profile...

August 27th, 2015 Dave Webb
Screen Shot 2015-08-26 at 9.05.23 PM.png

CSO Digital

With the occurrence of each and every data breach, Canadian business leaders respond with the question “is my company’s information...

August 27th, 2015 IT World Canada Staff
Cyber-security map of Canada

Interactive map: Which Canadian region spends the most on IT security?

How much of your IT budget should be spent on security? In the face of high-profile data breaches like the...

August 27th, 2015 Brian Jackson
Canadian businesses and IT

Join industry experts for live demos, best practices and more at Citrix Mobility Toronto

The workplace has no walls. And that’s good for productivity. Thought leaders have been preaching the benefits of an anywhere,...

Sponsored By: Citrix
cloud security

A small percentage of users cause greatest risk, says vendor

There's a long list of ways your organization is vulnerable to attack, but a cloud security vendor offers a thought:...

August 27th, 2015 Howard Solomon
Intel Avoton Chip wafer2013

Microsoft readies Surface Pro 4

Microsoft may seem like it is focused only on rolling out Windows 10, but the company’s efforts in moving forward...

August 27th, 2015 Chris Lau