Sleeping through the Alarm – What Breaches Should be Telling Us, and Why the Message is Missed

The disconnect is real. Alarm bells are ringing but who is listening? "As cyber-attacks and security threats become increasingly sophisticated and the vectors from which an organization can be threatened grows in parallel,

Published on: October 14th, 2014 IT World Canada Team

A Matter of National Security: BM.I Relies on SafeNet Encryption to Secure Storage

Learn more about this extensive and best-in-class security solution in “A Matter of National Security: BM.I Relies on SafeNet Encryption to Secure Storage”. Download and read this case study now.

Published on: October 14th, 2014 IT World Canada Team

Five myths of cloud computing – Cloud computing: what does it mean, really?

Embracing cloud where it makes sense for your business can accelerate your time to revenue and reduce your costs.  But embracing cloud means cutting through the hype to find real solutions. Download  Five myths of cloud

Published on: October 8th, 2014 IT World Canada Team

It’s A Hybrid Cloud World – Are You Managing Your Hybrid State?

In this white paper, Forrester Consulting validates the assertion that cloud deployments call back to a company’s data centre and create a hybrid environment. Based on in-depth interviews with 10 enterprise IT leaders,

Published on: October 8th, 2014 IT World Canada Team

Protect tappable cards and personal ID from wireless RFID pickpocketing

When I first got my Nexus card for fast entry to the U.S., I really didn't understand the importance of keeping it in its protective sleeve. It turns out the card uses RFID

Published on: October 7th, 2014 Chris Henry

Disaster Recovery Planning Guide

Download this "Disaster Recovery Planning Guide"to gain a business perspective on what is often mistakenly limited to a consideration of technological issues alone.  Learn to build a comprehensive framework that goes beyond technology

Published on: October 3rd, 2014 IT World Canada Team

Fighting back: Is the time for defensive IT security policy over?

Is it time to move away from defence-based protection of our data and IT systems and fight back against those who would use computers to  compromise power, water, communication and transportation infrastructure? It

Published on: September 17th, 2014 Dave O'Leary

Maximize your UC&C outcomes – Improve the user experience and contain costs with a unified network

Download this HP business white paper to learn how a refreshed network will enable you to effectively provide employees with secure and reliable access, network services, and communication tools—in turn, allowing them to

Published on: September 2nd, 2014 IT World Canada Team

An energy sector CIO explains what’s needed to stop security threats early

For most CIOs, “uptime” is all about whether servers or other IT infrastructure is running properly, but Doug Thomas is one of the few who is literally focused on keeping the lights on.

Published on: August 11th, 2014 Shane Schick