Last 7 Days


Cisco to buy cloud security provider

Cisco Systems intends to strengthen its security portfolio by buying OpenDNS,  a company that  provides a cloud-based service to block malware....

June 30th, 2015 Howard Solomon
Screen Shot 2015-06-26 at 7.31.27 PM

The unhealthy state of CIO influence in Canadian health care

While many CIOs are redefining their roles, those in healthcare face budgetary and regulatory issues that make it even tougher...

June 30th, 2015 christine wong
Screen Shot 2015-06-26 at 8.43.09 PM.png

Where the DevOps dialogue should lead in enterprise IT

There’s something magical about credit cards -- and I don’t just mean the illusion of buying something without paying real...

June 30th, 2015 Shane Schick

Application performance management should take design lessons from the smartphone industry

Every experience is now a software experience, which means application performance management (APM) needs to get out of the blame...

June 29th, 2015 Gary Hilson

Patch warning: Exploit kit already takes advantage of Flash vulnerability

When it comes to patching software, Adobe Flash fixes may not be highest in priority for some organizations. Not for...

June 29th, 2015 Howard Solomon

Software developers still failing to create secure code: Report

Buying packaged applications or subscribing to a cloud service are the only way to go for many organizations, for these...

June 29th, 2015 Howard Solomon
Team Silhouette

Who tells you what to do?

People working in Information Technology (IT) must be trusted with many things so we look for people who are ethical....

June 29th, 2015 Donna Lindskog
Screen Shot 2015-06-26 at 7.21.54 PM.png

Meet a former CIO who now has ‘innovation’ in his job title

An IT executive with a diverse background at organizations such as Rexall and Cogeco, Faramarz Farahani has spent the last...

June 29th, 2015 Shane Schick
cloud security

How CISOs can find and secure rogue cloud applications

An insurance company is not the enterprise whose staff should be fooling around with insecure cloud applications. But with software-as-a-service...

June 26th, 2015 Howard Solomon
Citrix WorxHome. (Image: Citrix).

The pressure is on for IT departments to develop mobile apps

Employees and customers love mobile apps, and want more of them. But IT departments are having problems delivering, according to...

June 25th, 2015 Danny Bradbury

Critical success factors for IoT projects

The Internet of Things (IoT) is the trend of the year in information technology. Fantasies about IoT possibilities have been...

June 25th, 2015 Yogi Schulz
data color

Just how big is big data?

Open any current business and technology publication and you will find at least one article on big data. IT World...

June 25th, 2015 Dave O'Leary
security and privacy issues

Industrial control system breaches rising, says new report

Breaches that result in the theft of millions of pieces of personal data get big headlines, such as those involving...

June 25th, 2015 Howard Solomon

Data awareness is the next wave of enterprise storage

You’ve had the NAS vs. SAN debate. You’ve compared the economics of on-premise vs cloud and the combination of both....

June 24th, 2015 Gary Hilson

A CISO primer for threat information sharing specifications

Threat information sharing is becoming the new infosec pro buzz phrase, in part because President Barak Obama is encouraging the...

June 24th, 2015 Howard Solomon
Screen Shot 2015-06-24 at 10.20.19 AM.png

One quick way to stimulate CIO-board engagement in Canada

A few months ago, I was at an event where someone made a comment that, due to the increased impact of...

June 24th, 2015 Shane Schick
1 on 1 Training

Application misuse is proving hard for IT to spot

Business users are misusing applications, according to report released today – and IT departments are finding it difficult to stop...

June 24th, 2015 Danny Bradbury