Series of user profile images connected in a graph

Watch where you connect your accounts

Pokémon Go was just released in Canada. The title, which has rocketed to the top of the Apple and Google...

July 19th, 2016 Mark Nunnikhoven

99783415

Breach notification reporting can be complicated without proper skills, tools

A key question raised by pending changes to the Personal Information Protection and Electronic Documents Act (PIPEDA), which require organizations to...

July 18th, 2016 Gary Hilson

Cyber-crime-keyboard-620x250

The alarming rise in imposter email calls for new lines of defence

There’s an imposter in your email, and it’s trying to steal your organization’s money or sensitive information. Unlike malware, imposter...

July 15th, 2016 Cindy Baker

Does BlackBerry ending the classic device make sense?  

BlackBerry fans are in an uproar over the company’s decision to wind down the Classic. “Change is necessary,” they say....

July 11th, 2016 Chris Lau

AVG

Antivirus maker Avast purchases rival AVG in US$1.3 billion dollar deal

Security vendor Avast is acquiring fellow antivirus maker AVG, best known for its free consumer products, in a cash deal...

July 8th, 2016 IT World Canada Staff

148650499-620x250

Security in agile world: There’s no going back

As IT embraces agile and the enterprise perimeter becomes increasingly porous, security has to roll with the changes and there’s...

June 27th, 2016 Gary Hilson

CSO Digital logo

(VIDEO) CSO Digital: Security Situations #1 – Managing Security in the Cloud

Research firm IDC predicts that the enterprise spend on cloud services and IT products will exceed $500 billion by 2020. But...

June 10th, 2016 Ryan Patrick

Security-Photo-3-620x250

Why our data access laws need to evolve ASAP

Be it through compliance or through resistance, it seems that every day a new major tech company is becoming embroiled...

June 2nd, 2016 Dave Yin

Addressing Advanced Email Threats: Protect Your Data and Brand

Addressing Advanced Email Threats: Protect Your Data and Brand

Inbound threats are becoming more organized, more personal, and more pervasive. Meanwhile, the potential for outbound leakage is great, with...

June 1st, 2016 IT World Canada Team