Security Pad, cyber security, IT

6 things that IT managers should add to their to-do lists for 2016

In many ways, 2015 could be defined as the year of the hack. Cybercrime has made headlines on an almost...

December 23rd, 2015 Jacques Latour


Is your supply chain strategy investor-ready?

The sustainability movement is gaining an unlikely ally: big money. In growing numbers, mainstream financial market players, such as large...

September 8th, 2015 Gartner

Adobe hack might be worse than thought: Report

Managing security risks and vulnerabilities

Download this IBM white paper to learn how organizations can protect high-value assets and provide scalable, cost-effective, integrated security....

December 22nd, 2014 IT World Canada Team

Feature Security Privacy 1

Risk management provider now ranks organizations against each other

IT security is a moving target: Just when you think you have all the holes covered, a new one pops...

June 23rd, 2014 Howard Solomon


The new ISMS, ISO/IEC 27001:2013 Expert insight

ISO/IEC 27001:2013 and ISO/IEC 27002:2013 are scheduled for publication on October 17th. This will be the first release of the...

September 5th, 2013 Ron Richard


Risk management should get personal: Rogers exec

Senior security and IT leaders must make risk management more personal to their employees if they want their business to be...

January 27th, 2011 Rafael Ruffolo

SAS expands risk management with HPC in-memory analytics

SAS expands risk management with HPC in-memory analytics

Recentadvancements in high performance computing technologies from SAS Institute Inc.,including an in-memory analytics solution that uses Hewlett-Packard Co.hardware, are expanding...

October 15th, 2010 Jennifer Kavur

Cloud computing is a risky business: IT managers

Cloud computing is a risky business: IT managers

Despite the hoopla surrounding cloud computing, almost half of U.S. IT managers are still wary of using cloud computing services...

April 7th, 2010 joab jackson