cisco-mid-year-security

Cisco 2015 Midyear Security Report

...

September 1st, 2015 IT World Canada Team

devops

DevOps fail: Avoid the most common business, technology and IT leadership mistakes

DevOps is ripe with potential pitfalls when it’s time for implementation, and they generally fall into three categories: business, technology...

August 21st, 2015 Gary Hilson

Shutterstock.com

On the rise: Security as a business enabler

Security remains top of mind for organizations across Canada from IT leaders all the way up to the executive boardroom....

August 18th, 2015 Brian Clendenin

threatmatrix

Research suggests cities with hosted data centres draw more cybercriminal activity

Hosted data centers have become a common avenue for enterprises to access and deliver IT services, but they’re also a...

August 11th, 2015 Gary Hilson

cloud security

Knowing the unknowable: the challenge of complying with the Digital Privacy Act

We have all heard the well worn joke about the manager who commands “I need a complete list of the...

July 17th, 2015 Mark Olson

edu-data

Delete with confidence: The policies needed to support enterprise data growth

Data is growing exponentially in every organization, but large school systems at the primary and secondary levels face their own...

July 7th, 2015 Gary Hilson

Cyber security

Struggling to identify cybersecurity KPIs?

Every day businesses are forced to spend increasing amounts of precious management time and resources on cybersecurity as data breaches,...

July 3rd, 2015 Yogi Schulz

data color

Security analytics — a new hope for security, or just hype?

Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high. The...

July 2nd, 2015 Gartner

Unlocked

The Holistic Approach to Preventing Zero Day Attacks.

Download it to learn what Target could have done to prevent this incident and mitigate the damage.  Discover a new...

June 22nd, 2015 IT World Canada Team