71080359

Eight per cent of your partners may be a high security risk: Study

One of the weakest links in an organization's IT security may be the most obvious: The telecom provider. That's one...

March 31st, 2015 Howard Solomon

101853027

Shift in network protection needed: Experts

The traditional notion of blocking cyber threats from entering the network needs an overhaul, according to some security experts. In...

February 11th, 2015 Nestor E. Arellano

security and privacy issues

More help for interpreting log results

In an attempt to differentiate its security products from others, Cyberoam has added a user activity-based risk rating capability to...

February 6th, 2015 Howard Solomon

100877267

Integrated Network Security Architecture: Threat-focused Next-generation Firewall

An integrated network security architecture can not only address the challenges of today’s more sophisticated threat landscape, but also provide...

January 12th, 2015 IT World Canada Team

IT problems, computer flaws, glitches

DDoS attacks cost businesses US$40,000 per hour: Report

The good news is that the majority of distributed denial of service (DDoS) attacks aimed at corporations tend to be...

November 17th, 2014 Nestor E. Arellano

data security,privacy,security

Tech sector urged to help rights groups suffering cyber attacks

A Toronto-based organization focusing on information technology and communications research is calling on software and technology companies to assist human...

November 12th, 2014 Nestor E. Arellano

cyber crime, crime, arrest

Police close Silk Road 2.0 alleged criminal network and 400 Web sites

The dismantling this week of the SilkRoad 2.0 Web site for anonymously buying and selling alleged illegal drugs and other unlawful goods...

November 7th, 2014 Howard Solomon

100271170

Some IT pros still turn off security features for performance: McAfee

Every department in an enterprise is under pressure these days to increase performance, which sometimes means taking shortcuts. But a...

October 29th, 2014 Howard Solomon

Adobe hack might be worse than thought: Report

Put IT security in hands of a chief risk officer, says Canadian expert

Organizations must take IT security away from the information technology department and put it in the hand of a chief...

October 20th, 2014 Howard Solomon