Thursday, August 11, 2022

EDITOR'S TOP TECH NEWS

Latest News

Best of the Web

CISA Warns Of Windows And UnRAR Bugs Exploited In The Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of two vulnerabilities exploited in the wild.

76% Of Remote Workers Prefer Remote And Hybrid Workplaces

According to a Deloitte report, 76 per cent of workers prefer remote and hybrid jobs, while only 21 per cent want to return to the old way of working before the pandemic.

Researchers Identify An Easy Way To Spot A Deepfake

According to security experts, a simple trick to detect a deepfake is to ask the person to turn their face to the side.

Companies Opt For Lower Valuation To Attract Funding

Companies are opting for a lower valuation to attract fresh funds as the U.S. IPO market ground to a halt with only eight companies managing a successful flotation this year.

Biden Signs Bill To Boost U.S. Semiconductor Production

President Joe Biden on Tuesday signed the CHIPS ACT, which provides $52.7 billion in subsidies for semiconductor production and research in the United States.

Attackers Break Into Twilio Customer Data Via Phishing Attack

Cloud communications company Twilio has confirmed a data breach in which attackers stole customer data via a text message phishing attack.

SENIOR CONTRIBUTORS

5G: improving network security end to end

The roll-out of 5G across the country could be considered one of the most highly anticipated technology advancements in recent memory. While many are focused on the advantages for consumers, organizations are also poised to reap the benefits.

Your organization’s security revolves around one thing: your people

Data and IT systems security are often viewed as the responsibility of the CIO. In truth, data security is the domain of everybody in the organization. Not focusing on the human side of security can put everything at risk.

Digital transformation benefits (Article 1)

A series of articles created to enhance your understanding of digital transformation.

Drones pose new threats to data centre security

A new threat has emerged in the form of unmanned drones, and a different type of perimeter is necessary to protect data centre operations.

Will Web3 disrupt our net zero transition?

The unique properties of Web3 and its applications, platforms, and assets have the potential to overcome some of the biggest challenges to global sustainability, and exciting new projects are demonstrating just how powerful Web3 could be for building a net zero future. 

How automated technologies can improve accounts payable

Time and money are valuable resources. Modern businesses must remove the dependance on outdated technologies and work to automate key functions. Here are four technologies CIOs can leverage to effectively eliminate tedious manual processes in accounts payable.

Coffee Briefings

Coffee Briefing August 9, 2022-AWS launches new training; BMO launches Pre-Authorized Payments Manager; LG...

Coffee Briefings are timely deliveries of the latest ITWC headlines, interviews, and podcasts. Today’s Coffee Briefing is delivered by IT World Canada’s editorial team! Missed last week’s Coffee...

TRENDING THIS WEEK

Study reveals Microsoft dominates brand loyalty for productivity devices

Plume, a SaaS experience platform for Communications Service Providers, released its latest Plume IQ, a monthly reveal of data-driven...

Canadian tech hiring to continue at a steady pace, says CompTIA

A report published last week by the Computing Technology Industry Association (CompTIA), a non-profit association linked to the industry...

Continuous scanning key to keeping SMBs safe: Report

The goal of implementing Zero Trust security is finding its way into small and medium sized business (SMB) environments,...

Bell to roll out 8 Gbps internet service

Bell has announced that it’s set to deliver 8 gigabits per second (Gpbs) internet service to select areas in...

Featured Downloads

ITWC's Top Technology PODCASTS

Cyber Security Today, August 10, 2022 – Bad apps are found in the PyPI repository, six backdoors are used in a gang’s cyber attacks,...

This episode reports on malware in the PyPI repository, six backdoors are used in a gang's cyber attacks, how to discover a deepfake video and more

Cyber Security Today, August 8, 2022 – Another warning to Cisco Small Business router administrators, a caution over website redirects, and more

This episode reports on vulnerabilities in routers and industrial gateways, a Twitter vulnerability that could have exposed anonymous users, a Slack password reset and more

Hashtag Trending August 10 – Ferrari recall; Google outage; Meta’s new chatbot and its problems

Ferrari is recalling almost every car it has sold since 2005, Google suffered an outage, and Meta’s new chatbot is already spewing...

Hashtag Trending August 9 – Netflix games remain unpopular; video game industry suffers post-pandemic; eBay’s new refurbished program

Netflix’s games aren’t very popular, video game industry slides post pandemic, and eBay’s new refurbished program causes headaches for resellers. That’s all the...

Deeper Dive: Ready, Set, Go (Episode 5)

Following a brief refresher on classic scenario planning, hosts Jim Love, CIO of ITWC, and Doug Sparkes, a lecturer at the Conrad School of Entrepreneurship and Business, riff collegially on how to avoid functional fixedness while identifying and developing scenarios.

When Two Hats are Better than One – Interview with Bobby Singh

Some leaders pay lip service to the notion of lifelong learning, opting instead to settle for what they already know. Bobby Singh...

The symbol Forrester uses to describe CIO-CMO relations in 2015 says it all

The analyst firm publishes an infographic that suggest improvement in the partnership between IT and marketing, but there's one gaping hole

Innovative Calgary information technology startups

Calgary’s tech innovators and entrepreneurs are leading digital transformation across the province and the world. Calgary is growing alongside Alberta into a global tech hub.

International Women’s Day: Five tech training courses that aim to break gender inequality in Canadian tech sector

women are still largely underrepresented in the tech industry. This slideshow details education and training resources to help women advance in the IT field.

International Women’s Day: Seven women who changed technology

You may find it difficult to believe in today's male-centric tech industry, but in the early days of IT, it was often the women who were the pioneers

25 crazy, wacky gadgets at CES 2022 [Part 3]

Will you use any of these eight gadgets from CES 2022?

ITWC TALKS

Securing OT from cyber attacks

By Graham Bushkes The geopolitical climate has far-reaching implications for cybersecurity. Warnings from governments, including those of the Five Eyes, indicate that situations like the...

Canadian farm and ranch retailer flying into open skies

While the easing of pandemic restrictions may have softened the business climate only slightly for many businesses, one Alberta-based retailer is preparing to scale...

Leveraging the power of interactive experiences in retail

Product imagery, done right, can drive retail sales into the stratosphere. But as many companies know, product imagery “done right” is done for less....

Hugely popular clothing brand evolving through technology

Surprised that the company behind one of the freshest and most exciting clothing brands in Canada was established way back in 1957? According to...

People focus is key to strong security in hybrid office era

Report after report tells us hackers are thriving in the emerging hybrid office era. Theo van Wyk, Head of Cybersecurity and Solutions Development at...

President to President VIDEOS

Featured Partner Content