148650499-620x250

Is Runtime Application Self-Protection the key ingredient for more secure software development?

One the challenges of embracing agile development and taking a DevOps approach to IT is incorporating security in such a...

August 25th, 2016 Gary Hilson

cyber security

First-Person Review: End-Point Threat Protection

Ask any security expert and they will quickly point out that end-point threat protection isn’t a product. It’s an ecosystem...

June 29th, 2016 Lawrence Cummer

VMware CEO Pat Gelsinger during his recent business trip to Toronto

VMware CEO Pat Gelsinger: “We are in the most disruptive period in the history of IT.”

As a 36-year tech veteran, CEO Pat Gelsinger of VMware Inc. has virtually seen it all from a technology perspective....

June 15th, 2016 Ryan Patrick

Securing your network and application infrastructure Part 3: Staying ahead of hackers

Securing your network and application infrastructure Part 3: Staying ahead of hackers

Fortinet’s Cyber Security platform can address most of the problems outlined in the essays in this e-book. Our ASIC-powered FortiGate...

December 18th, 2015 IT World Canada Team

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

For all the attention data security has received in recent years and all the technical advances in risk detection now...

December 18th, 2015 IT World Canada Team

Self Driving Gauge

VW software puts all IT under suspicion

Volkswagen has done the whole IT profession a disservice. The software in their cars has recently been found to give...

September 30th, 2015 Donna Lindskog

FEATURE SC Congress sign

SC Congress: Security leaders give sage advice for your company

I attended the SC Congress last week at the Metro Toronto Convention Centre. The halls were packed with IT professionals...

June 16th, 2015 Hibah Ahmed

Mobile Security

Creating people-centric security

By Paul Proctor and Tom Scholtz Gartner, Inc. As bring your own device (BYOD) becomes the norm in many organizations,...

June 10th, 2015 Gartner

medicine 2

Alarm bell sounded over flawed app development process

A new report is raising alarm bells about the way major companies develop mobile apps, warning user, corporate and customer...

April 7th, 2015 Jeff Jedras