security and privacy issues

How Akamai manages vulnerability risks

Given the reality that any IT system can be breached if the attacker has enough time and resources, it must...

August 12th, 2016 Howard Solomon

Managing Governance, Risk and Compliance with ECM and BPM

Managing Governance, Risk and Compliance with ECM and BPM

Many of the elements involved in meeting compliance and regulatory requirements are best managed by content and records management systems,...

March 25th, 2016 IT World Canada Team

Security Pad, cyber security, IT

6 things that IT managers should add to their to-do lists for 2016

In many ways, 2015 could be defined as the year of the hack. Cybercrime has made headlines on an almost...

December 23rd, 2015 Jacques Latour

Is your supply chain strategy investor-ready?

The sustainability movement is gaining an unlikely ally: big money. In growing numbers, mainstream financial market players, such as large...

September 8th, 2015 Gartner

Adobe hack might be worse than thought: Report

Managing security risks and vulnerabilities

Download this IBM white paper to learn how organizations can protect high-value assets and provide scalable, cost-effective, integrated security....

December 22nd, 2014 IT World Canada Team

Risk management provider now ranks organizations against each other

IT security is a moving target: Just when you think you have all the holes covered, a new one pops...

June 23rd, 2014 Howard Solomon

The new ISMS, ISO/IEC 27001:2013 Expert insight

ISO/IEC 27001:2013 and ISO/IEC 27002:2013 are scheduled for publication on October 17th. This will be the first release of the...

September 5th, 2013 Ron Richard

Risk management should get personal: Rogers exec

Senior security and IT leaders must make risk management more personal to their employees if they want their business to be...

January 27th, 2011 Rafael Ruffolo