Snowden support signs

The man in the middle of Snowden’s NSA expose

When former NSA contractor Edward Snowden was looking to communicate with people to help expose what he saw as inappropriate...

November 3rd, 2014 Howard Solomon

ITWC staff photo

Beware of gift iPads

The first day of the annual SecTor security conference in Toronto was filled with presentations on what to do --...

October 22nd, 2014 Howard Solomon

Adobe hack might be worse than thought: Report

Put IT security in hands of a chief risk officer, says Canadian expert

Organizations must take IT security away from the information technology department and put it in the hand of a chief...

October 20th, 2014 Howard Solomon

YouTube popularity attracting criminals

YouTube popularity attracting criminals

Enterprises are increasingly using YouTube as their vehicle for hosting internal an external videos. However, researchers at vendor Trend Micro...

October 20th, 2014 Howard Solomon

Ten tips for more secure sofware

Hackers using new Windows vulnerability

Microsoft is rushing out a patch for a newly-discovered zero-day vulnerability which affects all currently  supported versions of  Windows (including...

October 14th, 2014 Howard Solomon

Image from Shutterstock.com

Things bad in IT security now? It could get worse

Hackers are having a field day, major corporations are reporting huge data breaches almost every day, CSOs are pulling their...

October 8th, 2014 Howard Solomon

Matrix Style Password Graphic

Time to get more aggressive on cybersecurity?

The revelation this week that U.S. -based outlets of Home Depot may have suffered a stunning data breach -- one...

September 4th, 2014 Howard Solomon

78180592

When meeting the IT security standard isn’t enough

There's a price to be paid for organizations that aren't on the leading edge of security -- they usually get...

September 1st, 2014 Howard Solomon

Java Graphic

Warning issued for watering-hole attack

Crackers use a number of techniques to get into corporate systems, including reconnaissance through s0-called watering-hole attacks. This appears to...

September 1st, 2014 Howard Solomon