Sleeping through the Alarm – What Breaches Should be Telling Us, and Why the Message is Missed

The disconnect is real. Alarm bells are ringing but who is listening? "As cyber-attacks and security threats become increasingly sophisticated and the vectors from which an organization can be threatened grows in parallel,

Published on: October 14th, 2014 IT World Canada Team

Toronto upstart brings tokenization protection to UC, Web, PoS

The standard information security mantra is to protect sensitive data where it resides, but I posit that with the number of security breaches being publicized these days, we should quickly move to remove

Published on: October 10th, 2014 Michael Ball

Privacy and the Internet of Things: Practical or paranoia?

The promise of connected homes, cars, wearables and every day conveniences is growing rapidly. Established companies like Cisco Systems Inc., Telus Corp. and Rogers Communications have a great deal to gain as the Internet of

Published on: September 22nd, 2014 Mark Burdon

Are most Canadian companies willing to “roll the dice” on data breaches?

We roll our eyes when news reports reveal another data breach, but maybe we shouldn’t be surprised: A privacy lawyer at one of the country’s biggest law firms, says 70 per cent of

Published on: September 12th, 2014 Howard Solomon

Many mobile apps still ask for unexplained access to device data

Too many mobile apps are collecting private subscriber data without explaining why they need it, according to a study by international government privacy commissioners. Dubbed the Global Privacy Enforcement Network Privacy Sweep, examiners from

Published on: September 11th, 2014 Howard Solomon

Global agreeement on surveillance needed, says Hillary Clinton

Former U.S. secretary of state Hillary Clinton has called for an international agreement on the amount of information governments are collecting electronically. “At some point, I think there needs to be a global pact

Published on: September 4th, 2014 Howard Solomon

How much is too much IT security?

Usually security implementers are aware of all the red tape they create, and evaluate the trade-offs against the value of what they are guarding. Usability and efficiency are certainly important, but it is

Published on: August 27th, 2014 Donna Lindskog

US has automatic cyberattack software, says Snowden

Science fiction has a way of creeping into reality -- or vice versa. Take, for example, the idea that computers will become so intelligent they will automatically launch weapons at the first sign

Published on: August 14th, 2014 Howard Solomon

An unlimited appetite for data

Law enforcement and government intelligence agencies will insist they can never gather too much information when conducting an investigation. They're probably right. On the other hand, if let completely lose these agencies would probably collect

Published on: August 14th, 2014 Howard Solomon