Opportunity Knox: Managing a fleet of devices

Mobile device use is not a new fad or trend for government workers, who have been using smartphones on the...

Sponsored By: Samsung

Opportunity Knox: More secure, zero-touch enrollment

Think about how IT professionals used to set up and assemble computers: they configured hardware, booted machines, and when prompted,...

Sponsored By: Samsung

Opportunity Knox: Flexibility and defence-grade security

The Government of Canada’s Information Technology Strategic Plan 2016-2020 lays out policies and procedures required to mitigate the risk of...

Sponsored By: Samsung

The Top 8 Mobile Security Risks

More sensitive data is passing through or residing on enterprise mobile devices than ever before. While IT leaders recognize the...

September 16th, 2017 IT World Canada

The Four Critical Areas You Must Address for Cloud Security

Cloud computing is a disruptor of traditional information technology methods - and security is not immune to these changes. As...

September 16th, 2017 IT World Canada

HealthTech and Security: Sharing and Safeguarding Patient Data

Download this insightful report from Aberdeen Group based on its survey and study of nearly 150 healthcare organizations, and learn...

July 14th, 2017 IT World Canada

The human point: Taking a people-first approach to security

In his 1711 “Essay on Criticism,” the British poet Alexander Pope wrote, “To err is human; to forgive, divine.” Putting...

Sponsored By: Forcepoint

Strength from within: orchestrating your breach recovery

How would you respond to the question of how much time and thought your organization has dedicated to data recovery?...

Sponsored By: IBM

Overcoming the people problem in cybersecurity

According to Gartner Inc., worldwide spending in information security — a subset of the broader cybersecurity market — will reach...

Sponsored By: Herjavec Group