Blogs

Image from Shutterstock.com

Augment encryption with tokenization

Share on LinkedIn Share with Google+ Comment on this article 09/17/2014

For the protection of sensitive data, tokenization is every bit as important as data encryption. We are all very familiar with the

Why organizations will run to the cloud, not from it

When attending the Gigaom Structure conference in San Francisco this summer, two things stood out for me: One was how few organizations are actually running loads in the cloud today. The second was

Published on: September 16th, 2014 Jeremy Hill

Preventing fraud in the call centre: Use voice biometrics, phone printing

The fraudster called the credit card company with a simple request; he was traveling out of the country and wanted fraud controls lifted on his account for 30 days. The call center agent

Published on: September 11th, 2014 Gartner

So you think you can blog? Your last chance to prove yourself!

With less than two weeks until the contest closes, this is your last chance to try your hand at IT blogging and win one of four prizes. Our two previous suggested topics were

Published on: September 10th, 2014 Hibah Ahmed

A hype cycle for the cloud chasm

I’ve been thinking about adoption rates and use cases for cloud computing, particularly here in Canada.  My goal is to find signs that Canada is moving down the path towards “cloudiness” just as

Published on: September 3rd, 2014 Don Sheppard

Dealing with IT setbacks

After working through some challenging management problems, a staffer came to me and reported a setback to which I uttered “Rats, Bats and Alley Cats”. The stupefied employee retorted – “Say what?”  I

Published on: September 2nd, 2014 Ken Metcalfe

How much is too much IT security?

Usually security implementers are aware of all the red tape they create, and evaluate the trade-offs against the value of what they are guarding. Usability and efficiency are certainly important, but it is

Published on: August 27th, 2014 Donna Lindskog

New topic for: So you think you can blog?

Good morning fellow blogging enthusiasts! As promised, we have a new suggested topic for our blogging contest. Remember that you can still contribute blog posts about our previous topic, IT security, but if

Published on: August 27th, 2014 Hibah Ahmed

The demise of excess access: A eulogy for traditional VPN

Once upon a time, in a world where mobile meant "laptop" or "remote home PC", Corporate network connectivity came in two flavours: dial-up modem, with it's clunky protocols and achingly slow speeds, and

Published on: August 26th, 2014 Michael Ball

Women in IT lead with grace, assertiveness, courage and swagger

I was really excited to attend the Women in the IT Channel Recognition Luncheon last Thursday as a guest of Roberta Fox of the Fox Group. I wasn't sure what to expect. Growing up

Published on: August 26th, 2014 Chris Henry