Partners in compliance: Preparing for changes to PIPEDA

On November 1, 2018, an acronym that most people still can’t pronounce is slated to change the face of data...

August 22nd, 2018 Suzanne Robicheau

Visa’s chief risk officer shares the company’s four pillars of payment security

As the chief risk offer at Visa Inc., Ellen Richey knows a thing or two about data security. After all,...

February 15th, 2018 Eric Emin Wood

Opportunity Knox: Layered depth defence

Whether it’s a border wall or a frontline trench in wartime, security has always involved a demarcation. This concept has...

Sponsored By: Samsung

Opportunity Knox: Managing a fleet of devices

Mobile device use is not a new fad or trend for government workers, who have been using smartphones on the...

Sponsored By: Samsung

Opportunity Knox: More secure, zero-touch enrollment

Think about how IT professionals used to set up and assemble computers: they configured hardware, booted machines, and when prompted,...

Sponsored By: Samsung

Opportunity Knox: Flexibility and defence-grade security

The Government of Canada’s Information Technology Strategic Plan 2016-2020 lays out policies and procedures required to mitigate the risk of...

Sponsored By: Samsung

The Top 8 Mobile Security Risks

More sensitive data is passing through or residing on enterprise mobile devices than ever before. While IT leaders recognize the...

September 16th, 2017 IT World Canada

The Four Critical Areas You Must Address for Cloud Security

Cloud computing is a disruptor of traditional information technology methods - and security is not immune to these changes. As...

September 16th, 2017 IT World Canada

HealthTech and Security: Sharing and Safeguarding Patient Data

Download this insightful report from Aberdeen Group based on its survey and study of nearly 150 healthcare organizations, and learn...

July 14th, 2017 IT World Canada