Mobile phones background. Pile of different modern smartphones. 3d

Published: June 29th, 2020


IoT devices are the new Trojan horses. Here’s how to secure them

Right now, your vacuum could be checking out your home or office for would-be thieves. Many robot vacuums are IoT...

June 25th, 2020 Cindy Baker

Bell now offers BlackBerry Protect to business and government customers

Bell today announced that it has become a BlackBerry’s Mobile Threat Defense (MTD) partner and in turn now offers the...

June 16th, 2020 Tom Li

Digital Transformation Week 2020: Advice when you need it most

With the pandemic sparking unprecedented digital transformation efforts, organizations looking to peers and leaders for the best advice on what...

June 15th, 2020 Steve Proctor

Don’t install the Windows 10 update 2004 until these issues are fixed

Windows 10’s update woes continue. Hot on the heels of a botched security patch that was retracted on Feb. 15,...

June 1st, 2020 Tom Li

Balsillie, Trecroce, Padelford added to Digital Transformation Week lineup

Three more heavy hitters in the tech industry with extensive experience in digital transformation have joined the lineup for ITWC’s...

May 12th, 2020 Steve Proctor

Zoom acquires Keybase to add end-to-end encryption to videoconferencing – Verdict

Zoom acquires Keybase to add end-to-end encryption to videoconferencing - Verdict Videoconferencing giant Zoom announced on May 7 that it...

May 11th, 2020 Pragya Sehgal

Overcoming security complexity

There isn’t a country in the world in which security, and the threat of being hacked, isn’t an ongoing issue....

Sponsored By: FlexITy & Cisco

How to stonewall the hackers trying to to get around your MFA

Multi-factor authentication (MFA), a security system that requires multiple methods of authentication from independent categories of credentials to verify a...

February 27th, 2020 Glenn Weir

Why pizza party security training doesn’t cut it anymore

When it comes to company security, “human error” is a frequently identified factor. However, many organizations have found that their...

February 24th, 2020 Glenn Weir