Zero trust: Data breach prevention is all about breaking the kill chain

Breaches to enterprise security are often an inside, albeit unintentionally, thanks in part to the rise of privileged users. Once...

March 10th, 2016 Gary Hilson


Apple vs FBI: why we need a “Made in Canada” solution

You will already be familiar with the court order initiated by the FBI in California, directing Apple to circumvent the...

March 4th, 2016 Mark Olson


VMware focuses on end user productivity with Workspace ONE, Horizon updates

Having helped transform the data centre to one that is software-defined, VMware CEO Pat Gelsinger said the company is now...

February 9th, 2016 Gary Hilson


ServiceNow adds identity management to the mix through Centrify integration

Enterprises are always looking to automate as many processes as possible, or at least simplify them, while maintaining security. ServiceNow...

February 2nd, 2016 Gary Hilson

Ten tips for more secure sofware

IT not doing enough to secure Active Directory, says expert

It's long been known that members of IT teams often don’t speak to each other. Just as data can be...

January 21st, 2016 Howard Solomon


Centrify secures threats created by outsourced IT support and development credentials

Outsourcing IT to a third party is nothing new, but nowadays, there’s so many places for it to be outsourced...

January 12th, 2016 Gary Hilson

IBM MSS – Insider Threat

IBM MSS – Insider Threat


October 28th, 2015 IT World Canada Team

Security password

Investigators took only a week to crack bulk of Target’s passwords

The embarrassing 2013 data breach at Target Corp. which saw 40 million customer debit and credit card accounts exposed after attackers...

September 22nd, 2015 Howard Solomon

Dell featured 2

Identity & access management the focus of Dell’s new security approach

LAS VEGAS – Dell wants to move the impression the market has of its security portfolio beyond the SonicWall firewall...

August 31st, 2015 Jeff Jedras