Mobile Security

Why security has to utilize the cloud and mobility

With only a credit card and the promise of business benefit (without IT involvement), today’s organizations are moving towards the...

September 20th, 2015 Bjorn Gudehus

cyber security

Take action against data breaches now

There’s no escape, and you can be assured that it will occur if it hasn’t already! I’m talking about data...

June 17th, 2015 Tamer Marzouk

SC Congress: Security leaders give sage advice for your company

I attended the SC Congress last week at the Metro Toronto Convention Centre. The halls were packed with IT professionals...

June 16th, 2015 Hibah Ahmed

cloud security

Q&A: Former Alberta CISO on overcoming cloud security concerns

Information is widely viewed as a company’s most important asset. And today, more than ever, cyber-threats are a looming presence...

December 19th, 2014 Brian Clendenin

data security,privacy,security

The cost of a data breach in 2014: $3.5 million, Ponemon study says

In December 2013, news broke that U.S. retail giant Target Corp. had suffered a major breach, losing the personal information...

May 13th, 2014 Candice So

#EncryptITWC – An IT World Twitter chat

Updated by Candice So Apr. 24, 2014 at 4:05pm ET: We ran a Twitter chat on encryption under the @itworldca...

April 17th, 2014 Candice So

Info rights management: Magic bullet or dud?

Info rights management: Magic bullet or dud?

FRAMINGHAM, MASS. -- Like many companies, mine has determined that the best way to expand our IT and business capabilities...

July 12th, 2012 j.f. rice

Canadian companies ‘overconfident’ in data security: Study

Canadian companies ‘overconfident’ in data security: Study

If you ask Websense Inc. whether most Canadian companies are as secure as they think they are, the answer is...

November 9th, 2011 jd speedy

FEATURE: Juggling ERM with in-house data

FEATURE: Juggling ERM with in-house data

Several years ago, Flextronics was struggling with a thorny security issue: figuring out how to prevent sensitive and proprietary information...

April 27th, 2010 elisabeth horwitt