fin6

Cybercriminals are a motivated, patient lot: how the end-to-end data theft cycle keeps on rolling

While the media is resplendent with articles covering security breaches due to hacks, malware and ransomware, rarely does it cover...

April 27th, 2016 Gary Hilson

fbi-idc

Enterprises should take a step back to decide what Apple vs. the FBI means to them

The U.S. Federal Bureau of Investigation (FBI)’s desire to have the world’s most popular smartphone creator build a backdoor is...

April 22nd, 2016 Gary Hilson

security feature

Apple, the FBI, and why security is the final frontier

Security and privacy have been in the news again -- especially around the Apple vs. FBI iPhone unlocking case -- but...

March 30th, 2016 Don Sheppard

Optimize Application Life Cycle with a Hybrid Cloud Strategy

Optimize Application Life Cycle with a Hybrid Cloud Strategy

IDC believes that NetApp's solution will resonate with LOB owners who are constantly struggling to keep their head above water...

March 25th, 2016 IT World Canada Team

Flash Storage for Dummies

Flash Storage for Dummies

Download this book as it examines various elements of flash storage: how it evolved, and why you should consider it...

March 25th, 2016 IT World Canada Team

Guidance on what to do with an older UPS

Guidance on what to do with an older UPS

“When should an older UPS be replaced with a new one?” is a question that virtually all data centre owners...

March 10th, 2016 IT World Canada Team

The Drivers and Benefits of Edge Computing

The Drivers and Benefits of Edge Computing

Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom...

March 10th, 2016 IT World Canada Team

Cyber-crime-keyboard-620x250

Cybercrime is evolving to be more personal and surreptitious

Organizations need to think hard about why they might be a target of a data breach -- as well as think...

March 1st, 2016 Gary Hilson

Addressing Advanced Email Threats: Protect Your Data and Brand

Addressing Advanced Email Threats: Protect Your Data and Brand

Inbound threats are becoming more organized, more personal, and more pervasive. Meanwhile, the potential for outbound leakage is great, with...

February 22nd, 2016 IT World Canada Team