Follow Tweet This Facebook LinkedIn

Top Stories

White House - Night Time

Biden’s cybersecurity priorities: Fixing damage from SolarWinds attack, working with allies

We interview two American and one Canadian expert on what to expect from the new administration

Latest Stories

Best of the Web

  1. How do you know if a company has a good remote work culture? – Built In

    Back when in-person interviews were the norm, applicants could get a glimpse into...
  2. Is Remote Work Making Us Paranoid? – New York Times

    Remote work eliminated any chance encounters and in passing conversations with our teammates....
  3. How to ace your next remote interview – Futurelearn

    There's a high chance that your next interview is going to be online...
  4. How to Have a Successful Virtual Happy Hour – The New York Times

    When in-person drink parties all but disappeared during the work from home shift,...
  5. 11 Essential Tips for Managing Remote Employees – Lighthouse

    Because remote work isn’t for everyone, managing a team of different personalities poses...

Bloggers Corner

We are always looking for senior-level IT professionals and IT executives to participate. Click here if you're interested in submitting a piece.
IT World Staff

Stronger cybersecurity starts with one word: agility

By Nick Alevetsovitis Right around when the pandemic first took hold, security researchers like Fortinet’s FortiGuard Labs which has a significant hub in Canada, noticed something. They observed a drop in malicious activity aimed at traditional network devices, and a sudden spike in attacks on email systems, browsers and home networks. Put simply, criminals saw…

Jason Barr

Supply chain vulnerability – Can too many vendors make you less secure?

“How many vendors does it take to make a business successful?” But if that number of vendors makes you more open to a cybersecurity breach, it’s no joke.

Yogi Schulz

Skeptical about data used for AI-derived recommendations?

As a senior executive or CIO, how can you assure yourself that the artificial intelligence or machine learning-derived recommendations are reasonable and flow logically from the project work that has been performed?

More IT Blogs


Partner Content

ITWC Talks

Security is everyone’s priority

Sponsored By: Microsoft