Follow Tweet This Facebook LinkedIn google+
Data Breach Graphic

Yahoo put user experience, new products over security, says news report

Howard Solomon, 20 hours ago
Ofoffice women in IT, workers, Microsoft

ISACA encourages women in IT to share success stories, leadership

Howard Solomon, 21 hours ago

Health centre improves employee satisfaction by eliminating the paper trail

Gary Hilson, 4 days ago
quantum computing, data

Prepare for threat of quantum computing to encrypted data, Canadian conference told

Howard Solomon, 1 week ago
FEATURE Microsoft Edge browser

Microsoft touts container protection for Edge browser

Howard Solomon, 12 hours ago
Windows 10 feature

Microsoft offers analytics tool to help admins update PCs to Windows 10

Howard Solomon, 13 hours ago

Google Cloud expands to more cities, but not in Canada

Howard Solomon, 13 hours ago
Kallo infohealth mobile healthcare

Canadian, U.S. doctors hold different views on EHRs

Howard Solomon, 15 hours ago
Canada IT Strategic Plan header

IBM Canada points finger at Conservatives over Phoenix payroll training: CBC

Howard Solomon, 18 hours ago
Image by Daoleduc via

The latest ransomware trends call for urgent defence measures


Is the world ready for a jack-less iPhone? Apple seems to think so

Don Sheppard, 21 hours ago

ITAC calls on Ottawa to do more to support ICT sector

Feature IT Authors

Yahoo’s user accounts hack a stark reminder of need for post-breach security risk strategies: Expert

Microsoft touts container protection for Edge browser

Cloud is at the heart of digital transformation, make sure DevOps is too

How employees can be at risk from doxxing threats

Feature IT Content

Feature IT Videos

The Top 4 Data Security Best Practices

Ryan Patrick, 2 weeks ago

The Road to Agility: Survey Says We’re Not There Yet

Managing Security in the Cloud: CSO Digital Security Situations #1

Feature ITWC Talks Articles

Image by Brilt from

Online Fraud: Why Passwords Aren’t Enough

Sponsored By: Telus
When attackers hold your data hostage: Addressing today’s security threats

When attackers hold your data hostage: Addressing today’s security threats

Sponsored By: Cisco

Commerce Knowledge Hub: The CMO’s guide to analytics and more

Sponsored By: IBM

Failing to understand licensing agreements comes with a cost

Sponsored By: COMPAREX
Industry talking to customers Learn More