200295423-001

CISO role is gaining traction: Survey

Chief Information Security Officers (CISO) may be starting to make an impact in North American companies, according to a recent...

November 24th, 2014 Nestor E. Arellano

data security,privacy,security

The cost of a data breach in 2014: $3.5 million, Ponemon study says

In December 2013, news broke that U.S. retail giant Target Corp. had suffered a major breach, losing the personal information...

May 13th, 2014 Candice So

Image courtesy of Shutterstock.com

#EncryptITWC – An IT World Canada.com Twitter chat

Updated by Candice So Apr. 24, 2014 at 4:05pm ET: We ran a Twitter chat on encryption under the @itworldca...

April 17th, 2014 Candice So

Feature Security Privacy 1

Spear phishing campaigns are more sophisticated: Symantec

Cyber-criminals are getting better at using targeted attack methods and strategic planning to break into the digital data vaults of...

April 8th, 2014 Brian Jackson

100041799

Use big data to fight security threats in 2014: Ovum

Enterprise organizations should look to big data analytics and other options to battle increasing security threats in 2014, according to...

November 26th, 2013 Nestor E. Arellano

Organizations taking longer to detect breaches: report

Organizations taking longer to detect breaches: report

The retail industry reported 15 per cent more data breaches in 2012 compared to the previous year but what could...

February 14th, 2013

New EU cybercrime rules to impact business

New EU cybercrime rules to impact business

Businesses are concerned over the European Commission’s plans of imposing strict data breach reporting rules on companies and organizations in...

February 7th, 2013

Interview: Symantec’s October surprises

Interview: Symantec’s October surprises

In this week's podcast, we talk to Kevin Haley, director of Symantec Security Response, about the company's latest intelligence report....

November 16th, 2012 brian bloom

Top 7 security threats for 2013

Top 7 security threats for 2013

The cat-and-mouse game between hackers and security professionals continues. As security technologies evolve over the next year, we can expect...

November 15th, 2012 brian bloom