Articles By Cindy Baker

Trusted insiders are now the most serious security threat

More than 50 per cent of organizations say their systems have been attacked by insiders within the last 12 months,...

February 1st, 2018 Cindy Baker
Global cloud computing

Data residency requirements will impede Government progress on cloud, says expert

The Government of Canada should shift its cloud policy away from data sovereignty to focus more on security, says Mario...

January 26th, 2018 Cindy Baker

Public sector has a huge opportunity to lead on AI in 2018

The public sector has the potential to outpace industry this year in the use artificial intelligence, according to one industry...

January 26th, 2018 Cindy Baker

Robots and big data will drive future productivity for industry

Like a scene from the Jetsons, robots are starting to roam the factory floors and warehouses of some of the...

January 17th, 2018 Cindy Baker

How software-defined network as a service solves 6 IT challenges

The main issue with networks these days is simple — they’ve become too complex. IT teams say they spend too...

Sponsored By: TELUS

Why a self-serve network is crucial to the success of your IT transformation

In the race toward business transformation, there’s one fundamental element that organizations may overlook: the network. IT networks need to...

Sponsored By: TELUS

How one of the oldest brands in the world reinvented its workplace

After 160 years in business, clothing manufacturer Fruit of the Loom is ready for digital disruption. The company has prepared...

Sponsored By: Microsoft

What makes Dell employees so happy and productive?

Employees at Dell say they have higher job satisfaction and productivity as a result of a company program that enables...

Sponsored By: Microsoft

Secure mobile healthcare? There’s an app for that

Security is a critical issue in developing mobile healthcare applications, but experts say it can be solved without compromising user...

December 1st, 2017 Cindy Baker

When the cyber criminals come calling, how fast can you shut the door?

A strong security strategy has never been more important, but it should also include effective post-breach tools to limit potential...

Sponsored By: Microsoft