Last 7 Days

People standing in a business meeting

Ethics say IT should track and measure projects

Ethics is often seen as being about what should NOT be done. The CIPS code of ethics says we should avoid...

March 26th, 2015 Donna Lindskog
HP-SOC_feature-620x250

HP opens Security Operations Centre in Canada

Hewlett-Packard Co. (HP) opened up a new regional Security Operations Centre (SOC) in Mississauga, Ont. today that is certified to...

March 26th, 2015 Brian Jackson
Data breach notification in Canada

Cisco issues fixes for IOS/IOS XE software

Cisco Systems has released seven security notes with a range of software fixes for network devices that run its IOS and IOS...

March 26th, 2015 Howard Solomon
Feature Gemalto mobile-security-banner

Mobile app security in a sorry state says IBM, Ponemon

According to a report from the Ponemon Institute and IBM, mobile security is in dire straits. The two companies unveiled...

March 26th, 2015 Danny Bradbury
Oracle CIO Mark Sunday

What’s it like to be Oracle’s CIO? You can’t tell by watching Oracle’s CIO

It's hard to imagine the kind of challenges someone like Mark Sunday would have in a given week, let alone...

March 25th, 2015 Shane Schick
CIO being cut out of C-suite

Five New Laws of Anti-malware Protection: Keep Up with Evolving Threats. What You Should Know to Protect Your Networks.

Download this brief white paper from Cisco to better understand the five new laws of anti-malware protection.  Prepare your defences...

March 25th, 2015 IT World Canada Team
Image from Shutterstock.com

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Download this white paper from Cisco to learn about the approaches needed to resolve the challenges and how Cisco solutions...

March 25th, 2015 IT World Canada Team
PayPal uses OpenStack private cloud

Why PayPal ditched VMware for OpenStack

As part of a move to reinvent its infrastructure, global online payment company PayPal has transferred nearly all Web traffic...

March 25th, 2015 Nestor E. Arellano
Cisco Annual Security Report

Annual Security Report, 2015

Users - and security teams - are both part of the security problem. Learn about these and other key findings...

March 25th, 2015 IT World Canada Team
mobile device management

Start innovation from the user

The best advice I ever received when I was looking to start a consulting business was this: "To guarantee success,...

March 25th, 2015 Kevin Pashuk
Image from
Shutterstock.com

Many Canadian banks target of attack, says security vendor

Fifteen Canadian financial institutions have been targeted by new a malware attack aimed at stealing passwords, says a Danish security...

March 25th, 2015 Howard Solomon
Screen Shot 2015-03-24 at 10.19.15 PM.png

Why Canadian CFOs may be more ready to fund CIO innovation than ever before

That business case for a new IT project you were reluctant to make to the boss? Now may be the...

March 24th, 2015 Shane Schick
IBM Developer Connect Markham

See what’s new at the developers’ playground

DeveloperConnect 2014 Join IBM for DeveloperConnect 2015 in Markham, Ontario on April 14 to learn what others are doing to...

Sponsored By: IBM
The Blackberry passport

Why BlackBerry is on the right track regardless of quarterly result

When BlackBerry reports quarterly results this Friday, March 27, investors will look for signs that the company’s core businesses are...

March 24th, 2015 Chris Lau
106518832

5 must-read cloud stories for March 24

Coca-Cola takes a sip of software virtualization Coca-Cola Co. is one of the many companies betting on virtualization to boost security....

March 24th, 2015 Nestor E. Arellano
Microsoft, Windows 10, operating system

Linux lovers fear Windows 10 lockout

Microsoft's move to alter its User Extensible Firmware Interface(UEFI) Secure Boot standard in Windows 10 that has many users of...

March 24th, 2015 Nestor E. Arellano
AA045492

Bearing up under the pressure

Any well-prepared CSO has a range of defensive weapons deployed in the environment to meet the widely varied threats out...

March 24th, 2015 Howard Solomon
Optimal, Canadian online payment firm

Montreal e-payment firm makes billion-dollar bid for U.K. rival

Online payments are still an area of growth if Optimal Payment's new acquisition is any indicator. Canada's own company offering...

March 24th, 2015 Dave Yin
wind mobile, wireless carrier

Public Mobile founder takes CEO seat at Wind Mobile

A shake-up of Wind Mobile’s board has resulted in the founder of rival carrier Public Mobile taking the chief executive...

March 23rd, 2015 Nestor E. Arellano
slideshow hacker shutterstock

Flaw in Cisco VoIP phones allows hackers to intercept conversations

Cisco has issued a security alert warning users of several of its voice over Internet Protocol (VoIP) phones that a...

March 23rd, 2015 Nestor E. Arellano
security and privacy issues

Expert Bruce Schneier: It’s hard not to despair over the state of IT security

The more things change the more they stay the same, goes an old saying. That certainly seems to be true...

March 23rd, 2015 Howard Solomon
feature Gemalto mobile users people

Smart phones lead in market for smart connected devices: IDC

A new forecast from IDC Corp. pegs the global market for smart connected devices at 2.5 billion by 2015, up...

March 23rd, 2015 Jeff Jedras
mobile device management

BYOD: How to drive people-friendly adoption

I recall years ago when my colleagues started bringing their own devices into work. It used to be that computing,...

Sponsored By: Telus
Communications Security Establishment , Canadian electronic spy agency

Leaked documents reveal Canada’s cyber warfare tools

Implanting malware on computer networks, disabling enemy computer systems, disrupting and grabbing control of an adversary’s infrastructure. It all sounds...

March 23rd, 2015 Nestor E. Arellano
investments-in-mobility-feature

Blackberry and Samsung Knox: Bringing end-to-end security for Android

Enterprise mobility management can be challenging - a balancing act between corporate requirements for compliance and security and employee desires...

Sponsored By: Samsung and BlackBerry
Image from
Shutterstock.com

Researchers to CIOs: Patch your BIOS to avoid new attack

Millions of PCs could easily be infected by malware with highly privileged access to system memory, said researchers in Vancouver....

March 23rd, 2015 Danny Bradbury
Image from Shutterstock.com

New PoS malware found, says Cisco

As if retailers don't have enough woes because of persistent cyber attacks in the last 24 months, now comes word...

March 23rd, 2015 Howard Solomon
TeraGo data centre servers

Wireless service provider TeraGo buying B.C. cloud firm for $33M

TeraGo Networks Inc., of Thornhill, Ont. is looking to expand its data centre and cloud computing offerings by purchasing Kelowna, B.C.-based...

March 20th, 2015 Nestor E. Arellano
bandaid, fix, repair

OpenSLL fixes potential DoS bugs

OpenSSL needs to be patched again. The open source project team said Thursday that version 1.0.2 of its toolkit for...

March 20th, 2015 Howard Solomon
slide cloud servers shurtterstock

5 must read cloud stories for March 20

Free private cloud solution for enterprises  AeroFS is offering a free private cloud solution which will allow up to 30...

March 20th, 2015 Nestor E. Arellano
Image from Shutterstock.com

Service to offer free TLS certificates

If they haven't already done it, organizations are increasingly turning to encryption to protect sensitive data. But they also need...

March 20th, 2015 Howard Solomon
HP ZvR display 3D disoplay

HP brings 3D to your desktop

Las Vegas -- With its Blended Reality vision, Hewlett-Packard Co. is looking to break down the barriers between the physical...

March 20th, 2015 Jeff Jedras
LDCM_Landsat8 satellite

Researchers get free satellite images from Amazon Web Services

The development of new geographically-oriented cloud applications got a boost recently with Amazon Web Services (NASDAQ: AMZN) move to enable...

March 20th, 2015 Nestor E. Arellano
IT leadership strategy business meeting

CIO leadership fundamentals part 3: Building core capabilities

One of the most important objectives for any CIO is to build core based capabilities for their own organization to...

March 20th, 2015 Gary Davenport
Cisco Annual Security Report

Detect, Disrupt, and Deny the Attack

The Best Cyber Security Defense is Being Prepared. Much of information technology is about problem solving. And there's tremendous satisfaction...

Sponsored By: Cisco