Last 7 Days

Ashley Madison

Ashley Madison parent company criticized by privacy commissioners over huge breach

Avid Life Media, the Toronto-based parent company of the controversial Ashley Madison dating site that was badly breached a year...

August 23rd, 2016 Howard Solomon
Airliner

Complex legacy systems leave airlines ripe for security turbulence

The recent disruption that left American airspace momentarily without a single Delta Air Lines jet was not the result of...

August 19th, 2016 Gary Hilson
Cyber-crime-keyboard-620x250

Canada’s police chiefs: “We need laws that force cybercriminals to reveal their passwords”

The news that Canada’s police chiefs are advocating for federal laws that would compel individuals to provide electronic passwords with...

August 18th, 2016 Ryan Patrick
Image by Daoleduc via GettyImages.ca

Largest ransomware-as-service scheme pulls in US$195,000 a month: Report

Canadians are among those who have fallen victim to a global ransomware-as-a-service scheme which targeted tens of thousands of users...

August 16th, 2016 Howard Solomon
Digital-Strategy-150_feature

Canadian enterprises aren’t prepared for digital transformation: IDC

While Canadian organizations have clued in that digital transformation can be the key for future business success, many firms still...

August 15th, 2016 Ryan Patrick
100282857

Initial enterprise wave of Facebook bots fails to impress

More companies are using Facebook chatbots to communicate with customers, but how useful are these tools really going to be...

August 15th, 2016 Danny Bradbury
programming languages

How “citizen developers” are driving the next wave of rapid app development initiatives

As applications have become more critical to business success, enterprise developers are under more pressure to deliver useful apps in...

August 12th, 2016 Chris Talbot
Pokémon_Go_03_edit

Why I’m playing Pokémon Go and why you should too

I have a confession to make: I’m brand new to Pokémon Go and barely know what I’m doing. I can’t...

August 5th, 2016 Don Sheppard
Canadian currency, money, dollar bills

Trying to measure the cost of a breach

CISOs know that data breaches cost money. One question is how much; another is whether the rest of the organization...

August 25th, 2016 Howard Solomon
Judge's Scorecard

Data breach scoring: The sad reality

Jeff Williams at Contrast Security recently spoke to Forbes about the lack of concrete data regarding breaches and hacks. In...

August 25th, 2016 Mark Nunnikhoven
data, network, database

Where are the fastest broadband and mobile speeds in Canada? Latest Speedtest Intelligence results reveal all

Rogers offers the fastest fixed line broadband speeds available in Canada, and Bell Mobility tops wireless download speeds on average,...

August 25th, 2016 Brian Jackson
148650499-620x250

Is Runtime Application Self-Protection the key ingredient for more secure software development?

One the challenges of embracing agile development and taking a DevOps approach to IT is incorporating security in such a...

August 25th, 2016 Gary Hilson
Machine-gallery-memristor-e1471986280241-620x250

Why HPE is focusing on the need for a new computing architecture

Sometime in the 23rd century, a Starfleet Academy instructor leads a class of red shirts across the terrain of an...

August 24th, 2016 Brian Jackson
redknee

Redknee’s strategic review follows major shareholder’s push for sale

Redknee Solutions Inc. is looking at its options. At the top of the week, the Mississauga, Ontario-based provider of real-time...

August 24th, 2016 Gary Hilson
data color

Gradual replacement of a legacy system

Sooner or later, most organizations face a problem with legacy systems. Such systems could have outdated or restrictive functionality or...

August 24th, 2016 Michael Issaev
authentication fob

Ashley Madison attack aided by credentials theft: Report

Poor administrator identity and access management controls were at the heart of last year’s huge data breach at Avid Life...

August 24th, 2016 Howard Solomon
AA045340

Next Generation Technology: A challenge or an opportunity?

Do you have an IT infrastructure plan in place? How does your company implement data analytics? Are you aware of...

Sponsored By: Avaya
security and privacy issues

Companies 100 per cent worse in cyber security than 10 years ago, says expert

How much of an uphill battle are CISOs facing? A pretty big one, at least according to the headlines. There's...

August 23rd, 2016 Howard Solomon
Ubiq-Front-2-620x250

Waterloo-based startup focuses on enhanced Wi-Fi in the enterprise

Waterloo, Ont.-based Startup Ubiq Inc.'s new conference room solution launching on Monday can be described as part Apple TV, part...

August 23rd, 2016 Brian Jackson
Modern interior of server room in datacenter

Storage in the digital world

According to IDC, the total amount of digital information created and replicated in 2013 surpassed 4.4 Zettabytes, and the size...

August 23rd, 2016 Don Sheppard
executives in a business meeting

Putting a new face on old lessons

Sometimes it's hard to find something really new in cybersecurity. Most lessons are riffs on the same rules experts learned...

August 22nd, 2016 Howard Solomon
FEATURE Nutanix appliance

Nutanix goes it alone with Cisco certification

It’s been a good week for Nutanix. The hyperconvergence firm has certified its software to run on Cisco’s Unified Compute...

August 22nd, 2016 Danny Bradbury
Gavel in court

Tech-savvy legal firms putting pressure on cloud providers

The legal sector has traditionally lagged when it comes to IT adoption, but cost pressures, coupled with stagnant growth in the profession...

August 22nd, 2016 Gary Hilson
Data_driven_620_250

Is your company data-driven?

In our age of analytics, more and more companies claim to be data-driven. They’re proud of having largely abandoned experienced-based,...

August 22nd, 2016 Yogi Schulz
Equifax Task Force Report

Equifax Task Force Report

While financial institutions are making progress in the realm of legal and ethical data acquisition and analytics, challenges remain. Organizations...

August 20th, 2016 IT World Canada Team
Data Breach Graphic

Score public data breach reports to restore trust, says security vendor

Some infosec pros think one of the reasons a number of organizations aren't putting enough resources into cyber security is...

August 19th, 2016 Howard Solomon
OpenText-HQ_feature

OpenText tops PwC’s list of ‘fastest growing cloud companies’

The cloud model of delivering software is gathering momentum and becoming the preferred way of doing business for many customers,...

August 19th, 2016 Brian Jackson
trulioo

Why innovative fintech requires scalable regulatory support

You have to have been hiding in a bunker not to have heard of “fintech" -- but have you heard of...

August 19th, 2016 Gary Hilson

Why the most requested unified communications (UC) feature isn’t even a UC feature

Would it surprise you to learn that the most requested Unified Communication (UC) feature I see requested isn't even a...

August 19th, 2016 Emily Nielsen
Image by  Zokara from GettyImages.ca

“Double-compromised” website reveals importance of patching

Compromising a Web site is a common way for threat actors to either get into an organization or spread malware....

August 19th, 2016 Howard Solomon