Articles Related to information security

Understanding cybersecurity management for FinTech : information security governance in FinTech (Article 2)

The second article in this series uncovers information security governance in FinTech, and provides deep insights into its characteristics, principles of good governance, and an integrated security governance framework.

Information-Centric Security

As the amount of data being created, shared and consumed skyrockets, IT security challenges increase. IT security professionals need to keep pace with identifying...

Why security has to utilize the cloud and mobility

With only a credit card and the promise of business benefit (without IT involvement), today’s organizations are moving towards the cloud at a rapid...

‘Simplify your IT strategy’, words information security can incorporate

IT World Canada published an excellent article on May 6th: "Goldcorp vice president: ‘Simplify your IT strategy’" The 3 Key questions asked by the GoldCorp...

Mobility allows organizations to realize major operational efficiencies

“The best examples are those that reduce ‘paper and pen’ processes that have been in place for decades that are replaced with real-time data input capabilities,” – Troy Davidson, Cenovus Energy

Telus chief security architect: “Forecast business needs”

Marc Kneppers, chief security architect at Telus, shares his guiding principles on security

The new ISMS, ISO/IEC 27001:2013 Expert insight

ISO/IEC 27001:2013 and ISO/IEC 27002:2013 are scheduled for publication on October 17th. This will be the first release of the only internationally accepted standard framework...

Strengths, information security, collaboration, quality and more… Hello World!

Hello world! Welcome to my first IT World blog post. So you have an idea of what to expect, the type of sharing being planned...

Stay on op - Ge the daily news in your inbox