Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

For all the attention data security has received in recent years and all the technical advances in risk detection now...

December 18th, 2015 IT World Canada Team

Self Driving Gauge

VW software puts all IT under suspicion

Volkswagen has done the whole IT profession a disservice. The software in their cars has recently been found to give...

September 30th, 2015 Donna Lindskog

FEATURE SC Congress sign

SC Congress: Security leaders give sage advice for your company

I attended the SC Congress last week at the Metro Toronto Convention Centre. The halls were packed with IT professionals...

June 16th, 2015 Hibah Ahmed

Mobile Security

Creating people-centric security

By Paul Proctor and Tom Scholtz Gartner, Inc. As bring your own device (BYOD) becomes the norm in many organizations,...

June 10th, 2015 Gartner

medicine 2

Alarm bell sounded over flawed app development process

A new report is raising alarm bells about the way major companies develop mobile apps, warning user, corporate and customer...

April 7th, 2015 Jeff Jedras