Data breaches in federal departments soar in 10 months

Here's another sign of how bad network security is in the national capital: The federal government suffered more data breaches in the last 10 months than it has the the last 10 years,

Share on LinkedIn Share with Google+ Comment on this article Published on: March 31st, 2014 Nestor E. Arellano

Become a social business in the Cloud. IBM Smart Cloud for social business collaboration services

Learn how IBM's SmartCloud for social business  helps organizations deepen relationships, drive operational effectiveness, and optimize workforces while promoting security-rich collaboration inside and outside the firewall and also leveraging cloud computing to help

Share on LinkedIn Share with Google+ Comment on this article Published on: March 13th, 2014 IT World Canada Team

Some ISPs don’t cave when asked for subscriber info, says report

A Canadian privacy and security group isn't impressed with the answers it got from Canadian Internet service providers about their policies on disclosing information about subscribers to government agencies. "They're not quite as

Share on LinkedIn Share with Google+ Comment on this article Published on: March 6th, 2014 Howard Solomon

Extending Next Generation Firewalls

This upgrade is not just to match higher network speeds with higher security performance. It is primarily designed to introduce a deeper level of inspection, beyond traditional port and protocol firewalls, for greater

Share on LinkedIn Share with Google+ Comment on this article Published on: March 5th, 2014 IT World Canada Team

High-End Firewall Strategies

Infonetics conducted this survey with key decision makers from organizations of over 1,000 employees that have already deployed high-end firewalls (defined as firewalls that currently support >40G aggregate throughput).

Share on LinkedIn Share with Google+ Comment on this article Published on: March 3rd, 2014 IT World Canada Team

IDC Analyst Connection – Unified Threat Management: Benefits of an Integrated Approach to Network Security

Fortinet asked Charles Kolodgy, research vice president of the security products practice at IDC, for his thoughts on the value of Connected UTM in the Enterprise. Register here to download the complete IDC

Share on LinkedIn Share with Google+ Comment on this article Published on: March 3rd, 2014 IT World Canada Team

Canada among top 10 APT targets

Canada was among the leading countries frequently targeted by advanced persistent threat (APT) attacks in 2013, according to the latest Advanced Threat Report from network security firm FireEye Inc. The company recently released

Share on LinkedIn Share with Google+ Comment on this article Published on: March 3rd, 2014 Nestor E. Arellano

The New Workplace: Supporting “Bring your own”

The New Workplace whitepaper from IBM explores the strategies, solutions and lessons learned by IBM that can help you derive value from the BYOD trend while maintaining a secure IT infrastructure and consistent

Share on LinkedIn Share with Google+ Comment on this article Published on: February 24th, 2014 IT World Canada Team

Fast track to the future

You’ll also learn about the action items – for the business and the IT practitioner – that can help an enterprise adapt to the fast-paced change driven by these trends.

Share on LinkedIn Share with Google+ Comment on this article Published on: February 24th, 2014 IT World Canada Team