Last 7 Days

Cloud computing, mobile VMware

3 Compelling Reasons to Consider Desktop Virtualization


September 3rd, 2015 IT World Canada Team

Where BlackBerry went wrong, and where it is headed next

John Chen spoke with Rich Karlgaard about BlackBerry’s turnaround. Chen said he turned down the CEO position three times before...

September 3rd, 2015 Chris Lau
Ashley Madison

The Ashley Madison hack: Insider, outsider — or it doesn’t matter

Was the Ashley Madison hack an inside job or strictly done from the outside? The debate rages in certain circles,...

September 3rd, 2015 Howard Solomon

Trustwave ‘hiring like mad,’ including in Canada, after acquisition

The finalization this week of the US$810 million purchase of security vendor Trustwave by Asian provider Singtel Telecommunications means the...

September 3rd, 2015 Howard Solomon
Screen Shot 2015-09-02 at 2.22.24 PM.png

The CISO of Bombardier on Target, Sony and the changing nature of risk

As chief information security officer for the world's third largest airplane manufacturer, Edward Kiledjian says his mission is to build...

September 2nd, 2015 Shane Schick

Edge-based data centres may address enterprise latency worries

Experts are suggesting that the need for low-latency communications is increasing as applications move increasingly to the cloud, and that companies...

September 2nd, 2015 Danny Bradbury
cloud feature

IT’s island mentality has got to go

When I started my new role as CIO at a large college, I spent time meeting with other executives in...

September 2nd, 2015 Kevin Pashuk
digital security key

Insider threats: Some telltale signs that could tip off CSOs and their teams

IT leaders have known for years that their own coworkers may turn out to be their worst enemies, but identifying...

September 2nd, 2015 Shane Schick
A screen shot from Check Point Software's Sandblast

Check Point says new sandbox catches malware before infection

A sandbox can be a useful tool for every CISO to have in a defence strategy, but it isn't perfect....

September 2nd, 2015 Howard Solomon
data color

Using analytics in auditing big data

Big data is defined by the large amounts of structured and unstructured data from multiple sources. Auditing big data is...

September 2nd, 2015 Tamer Marzouk
Magnifying glass on keyboard

HP’s cloud-based DNS traffic analysis to spot early signs of malware

There's no shortage of data that network devices spew out every minute. The only problem is how CISOs can sort...

September 2nd, 2015 Howard Solomon

Cisco 2015 Mid-Year Security Report

Who is one of your growing threats to enterprise security? Jane Austen. The literary crowd will recognize her as the...

Sponsored By: Cisco

5 Ways Disaster Recovery is Like Jack Bauer


September 1st, 2015 IT World Canada Team

Cisco 2015 Midyear Security Report


September 1st, 2015 IT World Canada Team
VMware AppVolumes

VMware’s tech preview aimed at managing legacy apps in Windows 10

SAN FRANCISCO — Firms making the migration to Windows 10 and wanting to manage their legacy Windows applications as they...

September 1st, 2015 Brian Jackson
Image from

Are boards deaf to CISOs, or do they just not care?

There is no doubt most members of a board of directors will shiver when told their organization has been the...

September 1st, 2015 Howard Solomon

CentriLogic expands Canadian data centre footprint with enterprise-grade Mississauga facility

CentriLogic has set up a new data center in the Greater Toronto Area which will provide enterprise-grade services and build...

September 1st, 2015 Gary Hilson
Dell Featured 1

Dell’s CSO on how to avoid following Ashley Madison’s CEO off the data breach plank

LAS VEGAS – On any list of what is keeping chief security officers (CSOs) up at night, avoiding presiding over...

August 31st, 2015 Jeff Jedras
HP FlexFabric 5930 switch

HP announces new switch, VDI solution backed by VMware software

SAN FRANCISCO — Hewlett-Packard Co. took its opportunity on the first day of VMworld, VMware’s annual user conference, to announce...

August 31st, 2015 Brian Jackson
Global cloud computing

CIOs advise on how to build the business case for cloud

So your CEO returns from a conference and pulls you aside in the hall. Having just learned all there is...

August 31st, 2015 Robert Dutt
Dell featured 2

Identity & access management the focus of Dell’s new security approach

LAS VEGAS – Dell wants to move the impression the market has of its security portfolio beyond the SonicWall firewall...

August 31st, 2015 Jeff Jedras
cloud security

HyTrust extends to access control suite to VMware NSX

The use of network virtualization is increasing in enterprises, and with it the security concerns that accompany squeezing more resources...

August 31st, 2015 Howard Solomon
Outsourcing IT

IT outsourcing remains healthy, but the functions being outsourced are changing

Companies are increasingly farming out functions such as IT security and application hosting, according to a report from analyst firm...

August 31st, 2015 Danny Bradbury

Velostrata decouples storage and compute by streaming workloads

Moving data and workloads to the cloud can be a hefty task for enterprises and some still prefer to keep...

August 30th, 2015 Gary Hilson
Mobile Security

Why security has to utilize the cloud and mobility

With only a credit card and the promise of business benefit (without IT involvement), today’s organizations are moving towards the...

August 30th, 2015 Bjorn Gudehus
Mozilla, Firefox, browser, search engine, technology, Internet

Browser fixes: Chrome to pause Flash, Mozilla plugs holes

Browsers are the essential tools people use in computing today, so it's essential their creators keep them secure. On Thursday...

August 28th, 2015 Howard Solomon
Image from

Dormant code in malware could be a problem, or a solution

In the ongoing battle between infosec pros and malware authors once thing is certain: Uncertainty. The bad guys are always...

August 28th, 2015 Howard Solomon