The great divide

There’s always been a significant gap in expectations and reality between IT and lines of business. A recent survey by Softchoice and VMware 250 IT managers and 750 line of business manager across

Share on LinkedIn Share with Google+ Comment on this article Published on: April 1st, 2014 Howard Solomon

App security full of holes: Report

You work hard to develop useful and secure applications for your organization or customers, but sometimes it seems like you’re running in quicksand. A recent study by Cenzic Inc., a maker of software

Share on LinkedIn Share with Google+ Comment on this article Published on: March 24th, 2014 Howard Solomon

Ease the pressure on IT security staff

Information technology is an ever-changing field,  and arguably IT security staff are the most under the gun in data centres as new threats emerge weekly. So it’s no surprise a recent survey by

Share on LinkedIn Share with Google+ Comment on this article Published on: February 21st, 2014 Howard Solomon

Five tips on fighting DDoS attacks

Distributed denial of service (DDoS) are among the toughest problems IT administrators have to face. On the one hand, they don’t involve the loss of corporate data. On the other they can temporarily

Share on LinkedIn Share with Google+ Comment on this article Published on: February 18th, 2014 Howard Solomon

Eight security takeaways

For the past few years Hewlett-Packard has issued an annual Cyber Risk report to provide security information to organizations to understand the vulnerability landscape and how best deploy resources to minimize security risk.

Share on LinkedIn Share with Google+ Comment on this article Published on: February 11th, 2014 Howard Solomon

Six security lessons from one of the biggest attacks in history

Hewlett-Packard’s Cyber Security Report 2013, released this week, includes an analysis of the huge attacks on computers in South Korea, which crippled banks and television networks through a remote access Trojan. Some sources

Share on LinkedIn Share with Google+ Comment on this article Published on: February 3rd, 2014 Howard Solomon

Eight more security best practices

If regular reports of successful hacking of organizations makes you think your enterprise is defenceless, it’s not: The Online Trust Alliance this month released a list of best security practices to reduce the

Share on LinkedIn Share with Google+ Comment on this article Published on: January 28th, 2014 Howard Solomon

8 tips for improving enterprise security

  With reports about data breaches capturing headlines in the last month we thought it time to revisit advice offered at last fall’s Technicity event in Toronto, which focused on cyber security. Andy

Share on LinkedIn Share with Google+ Comment on this article Published on: January 21st, 2014 Howard Solomon

CES 2014 Product Roundup

The annual CES show is usually full of consumer products but there's also lots for enterprises to be interested in. Here's nine early announcements that caught our eye

Share on LinkedIn Share with Google+ Comment on this article Published on: January 7th, 2014 Howard Solomon