Trend Micro Deep Security

Trend Micro Deep Security

The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at...

January 18th, 2016 IT World Canada Team

The Clock is Ticking on Windows Server 2003 Support

The Clock is Ticking on Windows Server 2003 Support

Download this white paper to examine the risks facing organizations running end-of-life (EOL) platforms and the options available to address...

January 18th, 2016 IT World Canada Team

security and privacy issues

Force Canadian organizations to have a CSO, says expert

Regulators have to force organizations to have independent chief security officers if this country is to make progress fighting cyber-attacks,...

November 11th, 2015 Howard Solomon

Cisco offers free help to rid hosting providers of major malware stores

In the war against cyber attackers, Cisco Systems is offering service providers a new weapon: Free help. For a small...

October 26th, 2015 Howard Solomon

Ten tips for more secure sofware

Cisco Annual Security Report 2015

Download The Cisco 2015 Annual Security Report for insights into the ongoing race between attackers and defenders, and how users are...

May 12th, 2015 IT World Canada Team

information security mind map

Another warning about using public Wi-Fi

Wi-Fi is a tremendous communications boon, allowing users of desktop and mobile devices great flexibility. But like all wireless technologies,...

March 27th, 2015 Howard Solomon

Flaw in Cisco VoIP phones allows hackers to intercept conversations

Cisco has issued a security alert warning users of several of its voice over Internet Protocol (VoIP) phones that a...

March 23rd, 2015 Nestor E. Arellano

Gloves IT teams fight back

Should we strike back against hackers?

  This week, IT security firm Kaspersky revealed that over 100 banks had been hacked across some 30 countries. The...

February 23rd, 2015 Danny Bradbury

IT department spiraling downwards

What’s behind a cyber attack?

In this white paper from IBM, the shortcomings of conventional breach investigation solutions are explored together with how companies can...

February 10th, 2015 IT World Canada Team