96114732

Sleeping through the Alarm – What Breaches Should be Telling Us, and Why the Message is Missed

The disconnect is real. Alarm bells are ringing but who is listening? "As cyber-attacks and security threats become increasingly sophisticated...

October 14th, 2014 IT World Canada Team

Image from Shutterstock.com

Toronto upstart brings tokenization protection to UC, Web, PoS

The standard information security mantra is to protect sensitive data where it resides, but I posit that with the number...

October 10th, 2014 Michael Ball

Machine to machine solutions, including telematics in vehicles, are expected to grow significantly

Privacy and the Internet of Things: Practical or paranoia?

The promise of connected homes, cars, wearables and every day conveniences is growing rapidly. Established companies like Cisco Systems Inc., Telus...

September 22nd, 2014 Mark Burdon

Lawyer Kirsten Thompson. ITWC staff photo

Are most Canadian companies willing to “roll the dice” on data breaches?

We roll our eyes when news reports reveal another data breach, but maybe we shouldn’t be surprised: A privacy lawyer...

September 12th, 2014 Howard Solomon

135870502

Many mobile apps still ask for unexplained access to device data

Too many mobile apps are collecting private subscriber data without explaining why they need it, according to a study by...

September 11th, 2014 Howard Solomon

JStone / Shutterstock.com

Global agreeement on surveillance needed, says Hillary Clinton

Former U.S. secretary of state Hillary Clinton has called for an international agreement on the amount of information governments are collecting...

September 4th, 2014 Howard Solomon

INSIDE SLIDE security lock on keyboard SHUTTERSTOCK

How much is too much IT security?

Usually security implementers are aware of all the red tape they create, and evaluate the trade-offs against the value of...

August 27th, 2014 Donna Lindskog

A Washington, D.C. rally in December, 2013 supported Snowden. Photo from Shutterstock Shutterstock.com

US has automatic cyberattack software, says Snowden

Science fiction has a way of creeping into reality -- or vice versa. Take, for example, the idea that computers...

August 14th, 2014 Howard Solomon

Smart phone graphic

An unlimited appetite for data

Law enforcement and government intelligence agencies will insist they can never gather too much information when conducting an investigation. They're probably...

August 14th, 2014 Howard Solomon