87740112

Securing Android For the Enterprise

It also reveals the strength of the Android market and takes a closer look at the role of Samsung's KNOX...

October 28th, 2014 IT World Canada Team

101414781

Breach Prevention Does Not Work – Learn How to Secure the Breach!

Find out why security strategies must shift from a mindset of breach prevention to one of breach acceptance—one that understands...

October 14th, 2014 IT World Canada Team

96114732

Sleeping through the Alarm – What Breaches Should be Telling Us, and Why the Message is Missed

The disconnect is real. Alarm bells are ringing but who is listening? "As cyber-attacks and security threats become increasingly sophisticated...

October 14th, 2014 IT World Canada Team

Image from Shutterstock.com

A Matter of National Security: BM.I Relies on SafeNet Encryption to Secure Storage

Learn more about this extensive and best-in-class security solution in “A Matter of National Security: BM.I Relies on SafeNet Encryption...

October 14th, 2014 IT World Canada Team

133958124

Five myths of cloud computing – Cloud computing: what does it mean, really?

Embracing cloud where it makes sense for your business can accelerate your time to revenue and reduce your costs.  But embracing cloud...

October 8th, 2014 IT World Canada Team

INSIDE SLIDE Cloud keyboard

It’s A Hybrid Cloud World – Are You Managing Your Hybrid State?

In this white paper, Forrester Consulting validates the assertion that cloud deployments call back to a company’s data centre and...

October 8th, 2014 IT World Canada Team

78617963

Protect tappable cards and personal ID from wireless RFID pickpocketing

When I first got my Nexus card for fast entry to the U.S., I really didn't understand the importance of...

October 7th, 2014 Chris Henry

121160057

Disaster Recovery Planning Guide

Download this "Disaster Recovery Planning Guide"to gain a business perspective on what is often mistakenly limited to a consideration of...

October 3rd, 2014 IT World Canada Team

SLIDE security SHUTTERSTOCK

Fighting back: Is the time for defensive IT security policy over?

Is it time to move away from defence-based protection of our data and IT systems and fight back against those...

September 17th, 2014 Dave O'Leary