BYOD Graphic

Carriers can only do so much to help with mobile security: Rogers

If anyone told you they had all the answers, you'd probably be dubious about the claim no matter what the...

April 16th, 2018 Brian Jackson

Safely enabling remote employee productivity

Technology is about progress, and in that progress, opportunity. Organizations that are willing and able to embrace and exploit new...

March 21st, 2018 Glenn Weir

New security mindset needed for a post-perimeter world

Recall for a moment the office of ten years ago — people in cubicles logging into apps running on local...

Sponsored By: IBM

Opportunity Knox: Layered depth defence

Whether it’s a border wall or a frontline trench in wartime, security has always involved a demarcation. This concept has...

Sponsored By: Samsung

Opportunity Knox: Managing a fleet of devices

Mobile device use is not a new fad or trend for government workers, who have been using smartphones on the...

Sponsored By: Samsung

Opportunity Knox: More secure, zero-touch enrollment

Think about how IT professionals used to set up and assemble computers: they configured hardware, booted machines, and when prompted,...

Sponsored By: Samsung

Time to get serious – Securing your business in the IoT era

The year 1999 was a huge year for hackers and IT security groups alike, with scores of Windows OS patches...

Sponsored By: Ingram Micro

Navigating a changing landscape

Before the Internet, technology was not typically a huge concern for most companies. Employees had a big box under their...

Sponsored By: D-link

Canadian firms: how can you ensure file sharing security as you scale?

By Ellie Martin The storage and sharing of corporate data has come a long way in the past century. Filing...

August 25th, 2017 IT World Canada Staff