security and privacy issues

Microsoft previews Active Directory threat analytics solution

Microsoft has started to market the Active Directory security scanning technology it bought last November from Israeli startup  Aorato. At...

May 5th, 2015 Howard Solomon

IT worker

There is talent out there

It's a claim made from coast to coast: we can't find IT talent. Yet, at the same time, there is...

February 25th, 2015 Bruce Stewart

Google is replacing letter/digits with a checkbox (Image from Shutterstock.com)

Google simplifies its CAPTCHA

Security is vital to the survival of all Internet-connected enterprises. Which is why a number of them force new users...

December 4th, 2014 Howard Solomon

feature passwordbox

Intel buys Canadian firm to handle ‘password fatigue’

Intel Corp. (NASDAQ: INTC) has snapped up a Montreal-based company that offers a service almost anyone can use – the...

December 1st, 2014 Nestor E. Arellano

Image from Shutterstock.com

Things bad in IT security now? It could get worse

Hackers are having a field day, major corporations are reporting huge data breaches almost every day, CSOs are pulling their...

October 8th, 2014 Howard Solomon

Biometric Mouse

Mouse could be used for identity management

Your next IT authentication process might be close at hand -- your mouse. According to Computerworld U.S., a cybersecurity researcher...

October 7th, 2014 Howard Solomon

Cloud Data Centre

Kaseya adds more security, compliance features to IT management

It hasn’t taken long for cloud IT management service Kaseya to add its latest British Columbia acquisition to the company’s...

September 30th, 2014 Howard Solomon

samsung-galaxy-s-iv

Samsung lets users oversee its Knox security platform

Samsung Electronics has enhanced its Knox security platform to give corporate owners of two of its devices the ability to...

September 19th, 2014 Howard Solomon

data security,privacy,security

How to protect Secure Shell access

A considerable number of Canadian IT departments rely on the Secure Shell protocol for automating access management thanks to it...

August 25th, 2014 Howard Solomon