CSO Digital logo

(VIDEO) CSO Digital: Security Situations #1 – Managing Security in the Cloud

Research firm IDC predicts that the enterprise spend on cloud services and IT products will exceed $500 billion by 2020. But...

June 10th, 2016 Ryan Patrick

Security-Photo-3-620x250

Why our data access laws need to evolve ASAP

Be it through compliance or through resistance, it seems that every day a new major tech company is becoming embroiled...

June 2nd, 2016 Dave Yin

Addressing Advanced Email Threats: Protect Your Data and Brand

Addressing Advanced Email Threats: Protect Your Data and Brand

Inbound threats are becoming more organized, more personal, and more pervasive. Meanwhile, the potential for outbound leakage is great, with...

June 1st, 2016 IT World Canada Team

Advanced Malware Protection: A Buyer’s Guide

Advanced Malware Protection: A Buyer’s Guide

To have any chance of effectively defending against modern-day attacks, the solution must use continuous analysis and big data analytics...

June 1st, 2016 IT World Canada Team

Cisco 2016 Annual Security Report

Cisco 2016 Annual Security Report

The Cisco 2016 Annual Security Report -- which presents research, insights, and perspectives from Cisco Security Research -- highlights the...

June 1st, 2016 IT World Canada Team

proofpoint-javascript

JavaScript has gone bad, beating out macros as top choice for spreading malware and ransomware

It’s quick, it’s easy, and it’s edged out macros embedded in Microsoft Office as the number one way to spread...

June 1st, 2016 Gary Hilson

99783415

PIPEDA changes should prompt improved security stances and roadmap creation

Businesses are data driven, and enterprises are challenged to both leverage data effectively and manage it. This includes securing it,...

May 30th, 2016 Gary Hilson

The present and future of application protection

The present and future of application protection

In today’s application-centric world, organizations offer applications with data access to employees and consumers to drive greater productivity, meet business...

May 15th, 2016 IT World Canada Team

The challenges and benefits of identity and access management

The challenges and benefits of identity and access management

The need for a robust identity and access management (IAM) strategy—to boost employee productivity and overall enterprise security—has become an...

May 15th, 2016 IT World Canada Team