Internet Security Threat Report

Download this comprehensive report from Symantec, based on its extensive security intelligence, and learn what you need to know about...

July 15th, 2017 IT World Canada

Brave face: Forming a proactive response to WannaCry

WannaCry, a global cyberattack by the WannaCry ransomware cryptoworm, has crippled at least 100,000 organizations and over 200,000 endpoints in...

June 15th, 2017 Glenn Weir

Ransomware and mobile app collusion are the main cybersecurity threats of late: Intel Security

Ransomware, the Pinkslipbot Trojan, and mobile app collusion are the growing cybersecurity threats of note in the past quarter, according...

June 14th, 2016 Ryan Patrick

Cybercriminals are a motivated, patient lot: how the end-to-end data theft cycle keeps on rolling

While the media is resplendent with articles covering security breaches due to hacks, malware and ransomware, rarely does it cover...

April 27th, 2016 Gary Hilson

IT problems, computer flaws, glitches

It’s time for law enforcement to take DNS seriously

We rely on law enforcement to be our first-line of defence against criminals online and offline. Yet, most law enforcement...

March 15th, 2016 Jacques Latour

HPE Security Research: Cyber Risk Report 2015

HPE Security Research: Cyber Risk Report 2015

This report provides security information leading to a better understanding of the threat landscape, and resources that can aid in...

January 5th, 2016 IT World Canada Team

Next-generation IPS and firewall

Next-generation IPS and firewall

Firewalls are best at controlling access to the network from outside. They are the security guard at the gate who...

November 26th, 2015 IT World Canada Team

Seven steps to software security

Seven steps to software security

Understanding technical security risk begins with knowing how and where vulnerabilities occur within an organization. Vulnerabilities can impact every level...

November 23rd, 2015 IT World Canada Team

The Fortinet Advanced Threat Protection Framework: A Cohesive Approach to Addressing Advanced Targeted Attacks

Discover how its proprietary software, high-performance appliances, and the FortiGuard Labs threat research teams seamlessly work together to deliver security...

May 12th, 2015 IT World Canada Team