Security is dead. Long live security. Using micro-segmentation to make cybersecurity work.

Security is dead. Long live security. Using micro-segmentation to make cybersecurity work.

Cybersecurity is dead. ...that is, the way it was originally designed and is currently deployed. Our reliance on computing and...

November 12th, 2015 IT World Canada Team

What CISOs can learn from the U.S. on handling a breach

Canada is different from the U.S. in a lot of ways. One of them is that our parliamentary committees, under...

September 17th, 2015 Howard Solomon

security and privacy issues

M-Trends® 2015: A View from the Front Lines

...

March 13th, 2015 IT World Canada Team

Tip 4 - 6 Tips to Improve Data Breach Response

MOVING TARGETS: THREAT ACTORS ARE ADJUSTING THEIR AIM

In response to this increased awareness, threat actors have evolved and are now utilizing more advanced approaches. Security teams can...

March 13th, 2015 IT World Canada Team

IT department spiraling downwards

What’s behind a cyber attack?

In this white paper from IBM, the shortcomings of conventional breach investigation solutions are explored together with how companies can...

February 10th, 2015 IT World Canada Team

Adobe hack might be worse than thought: Report

Managing security risks and vulnerabilities

Download this IBM white paper to learn how organizations can protect high-value assets and provide scalable, cost-effective, integrated security....

December 22nd, 2014 IT World Canada Team