Gloves IT teams fight back

Pros and cons of creating a threat intelligence team

We’ve written several pieces on the importance of threat intelligence these days to an organization. Being on top of threats...

November 22nd, 2016 Howard Solomon

2016 Cisco Annual Security Report

2016 Cisco Annual Security Report

Online criminals are quickly gaining access to organization’s data and holding private information hostage. Integrated threat defense technologies can often...

November 7th, 2016 IT World Canada Team

Advanced Malware Protection: A Buyer’s Guide

Advanced Malware Protection: A Buyer’s Guide

Traditional defenses, including firewalls and endpoint antivirus, no longer work against these attacks. The process of handling malware must evolve...

September 18th, 2016 IT World Canada Team

information security mind map

Automated data mining system finds 300 threats a week, say researchers

Threat intelligence is a much-bandied phrase these days, with security analysts saying CISOs need it to keep ahead of attackers....

August 10th, 2016 Howard Solomon

security and privacy issues

How to craft a threat intelligence strategy

An increasing number of CISOs are realizing the value of threat intelligence to protecting the enterprise, helping the infosec team...

July 19th, 2016 Howard Solomon

Advanced Malware Protection: A Buyer’s Guide

Advanced Malware Protection: A Buyer’s Guide

To have any chance of effectively defending against modern-day attacks, the solution must use continuous analysis and big data analytics...

June 1st, 2016 IT World Canada Team

Cisco 2016 Annual Security Report

Cisco 2016 Annual Security Report

The Cisco 2016 Annual Security Report -- which presents research, insights, and perspectives from Cisco Security Research -- highlights the...

June 1st, 2016 IT World Canada Team