Monday, August 15, 2022


Latest News

Best of the Web

Microsoft fixes UEFI bootloads that bypass Windows Secure Boot feature

Microsoft has identified three UEFI bootloads that can bypass the Windows Secure Boot feature and execute unsigned code.

Hacker gain root access to John Deere tractors

At the DefCon security conference in Las Vegas on Saturday, a hacker named Sick Codes jailbreak John Deere & Co tractors.

Organizations report 1,980 breaches in first half of 2022

According to a Flashpoint report, 1,980 breaches were reported by organizations in the first half of 2022, a 15 per cent decrease compared to the same period in 2021.

YouTube to launch streaming video service

According to a report in the Wall Street Journal, YouTube is working on launching an online store for streaming video service.

Microsoft withdraws Microsoft 365 version 2206 after crash reports

Microsoft has withdrawn the Microsoft 365 version 2206 updates after user crash reports.

Three ransomware gangs breached an automotive supplier in 2 weeks

LockBit, Hive, and ALPHV/BlackCat affiliates breached an automotive supplier’s systems within two weeks, with two of the attacks occurring within just two hours.


5G: improving network security end to end

The roll-out of 5G across the country could be considered one of the most highly anticipated technology advancements in recent memory. While many are focused on the advantages for consumers, organizations are also poised to reap the benefits.

Your organization’s security revolves around one thing: your people

Data and IT systems security are often viewed as the responsibility of the CIO. In truth, data security is the domain of everybody in the organization. Not focusing on the human side of security can put everything at risk.

Digital transformation benefits (Article 1)

A series of articles created to enhance your understanding of digital transformation.

Drones pose new threats to data centre security

A new threat has emerged in the form of unmanned drones, and a different type of perimeter is necessary to protect data centre operations.

Will Web3 disrupt our net zero transition?

The unique properties of Web3 and its applications, platforms, and assets have the potential to overcome some of the biggest challenges to global sustainability, and exciting new projects are demonstrating just how powerful Web3 could be for building a net zero future. 

How automated technologies can improve accounts payable

Time and money are valuable resources. Modern businesses must remove the dependance on outdated technologies and work to automate key functions. Here are four technologies CIOs can leverage to effectively eliminate tedious manual processes in accounts payable.

Coffee Briefings

Coffee Briefing August 9, 2022-AWS launches new training; BMO launches Pre-Authorized Payments Manager; LG...

Coffee Briefings are timely deliveries of the latest ITWC headlines, interviews, and podcasts. Today’s Coffee Briefing is delivered by IT World Canada’s editorial team! Missed last week’s Coffee...


Improving the Patient Journey – Interview with Jennifer Quaglietta

Jennifer Quaglietta has led countless initiatives that have a positive impact on the health of Canadians. As Vice President,...

Bell’s ESG performance in corporate responsibility and environmental standards recognized

Bell has been recognized as a leader in corporate responsibility by Corporate Knights. It has also achieved an important...

WEtech Alliance funds 19 companies through Cohort 1 of Government of Canada-funded i.d.e.a. Fund

19 companies received non-repayable contributions totalling C$567,700 from Windsor-based non-profit organization WEtech Alliance, in partnership with Innovation Guelph, through...

Canadian recreational vehicle maker BRP, Ontario Cannabis Store dealing with cyber attacks

Also, distribution of marijuana products in Ontario has been disrupted following a cyber attack on its distribution partner

Featured Downloads

ITWC's Top Technology PODCASTS

Cyber Security Today, Aug. 15, 2022 – Watch for patches from Palo Alto Networks, Microsoft and others

This episode reports on important security updates IT administrators should be aware of

Cyber Security Today, Week in Review for August 12, 2022

The theme of this week's discussion is why employees do risky things like click on malicious links that defeat multifactor authentication

Hashtag Trending August 12 – Facebook is not popular with teens; misinformation continues to spread; FCC rejects Starlink’s application for $885 million subsidy

Teens are not using Facebook, research reveals people are seeing misinformation weekly, and the FCC rejects Starlink’s request for $900 million in...

Hashtag Trending August 10 – Ferrari recall; Google outage; Meta’s new chatbot and its problems

Ferrari is recalling almost every car it has sold since 2005, Google suffered an outage, and Meta’s new chatbot is already spewing...

Deeper Dive: Ready, Set, Go (Episode 5)

Following a brief refresher on classic scenario planning, hosts Jim Love, CIO of ITWC, and Doug Sparkes, a lecturer at the Conrad School of Entrepreneurship and Business, riff collegially on how to avoid functional fixedness while identifying and developing scenarios.

When Two Hats are Better than One – Interview with Bobby Singh

Some leaders pay lip service to the notion of lifelong learning, opting instead to settle for what they already know. Bobby Singh...

The symbol Forrester uses to describe CIO-CMO relations in 2015 says it all

The analyst firm publishes an infographic that suggest improvement in the partnership between IT and marketing, but there's one gaping hole

Innovative Calgary information technology startups

Calgary’s tech innovators and entrepreneurs are leading digital transformation across the province and the world. Calgary is growing alongside Alberta into a global tech hub.

International Women’s Day: Five tech training courses that aim to break gender inequality in Canadian tech sector

women are still largely underrepresented in the tech industry. This slideshow details education and training resources to help women advance in the IT field.

International Women’s Day: Seven women who changed technology

You may find it difficult to believe in today's male-centric tech industry, but in the early days of IT, it was often the women who were the pioneers

25 crazy, wacky gadgets at CES 2022 [Part 3]

Will you use any of these eight gadgets from CES 2022?


Securing OT from cyber attacks

By Graham Bushkes The geopolitical climate has far-reaching implications for cybersecurity. Warnings from governments, including those of the Five Eyes, indicate that situations like the...

Canadian farm and ranch retailer flying into open skies

While the easing of pandemic restrictions may have softened the business climate only slightly for many businesses, one Alberta-based retailer is preparing to scale...

Leveraging the power of interactive experiences in retail

Product imagery, done right, can drive retail sales into the stratosphere. But as many companies know, product imagery “done right” is done for less....

Hugely popular clothing brand evolving through technology

Surprised that the company behind one of the freshest and most exciting clothing brands in Canada was established way back in 1957? According to...

People focus is key to strong security in hybrid office era

Report after report tells us hackers are thriving in the emerging hybrid office era. Theo van Wyk, Head of Cybersecurity and Solutions Development at...

President to President VIDEOS

Featured Partner Content