IT Management

IT Management

Spammers an enterprise unto themselves

The business world operates according to many well-entrenched patterns. Work schedules are defined based on labour and customer demands; a majority of day-to-day business...

Fintech gaining serious street cred

Fintech has become a major entry in the buzzword lexicon in recent years. While not a new concept – in fact, some consider fintech...

The future of encryption

What does a simultaneously dead and not-dead cat have to do with cybersecurity? Quite a bit, as it turns out. Schrödinger's quantum kitty is the...

Cyber security lessons from the energy community

Any widespread disruption of electricity, water or gas can have huge impact on day-to-day life. Critical infrastructure must be failsafe, protected and resilient –...

Held for Ransom and WannaCry

Ransomware is big business. In early May, the UK's National Health Service (NHS), along with hundreds of other organizations worldwide, was crippled by a massive...

Acceleration labs bridge the gap between incubation and commercialization

In today’s fast-paced technology environment, it’s not always easy for a large-scale enterprise to fast track an innovation agenda. While there are new ideas...

Digital transformation – new capability or new core?

For the past while, pundits have been telling us that every company will become an IT company, and, more recently, that every company will...

General Data Protection Regulation: from the EU with love

If you think that you're safe from needing to be compliant with the European Union's upcoming General Data Protection Regulation (GDPR), think again. If...

451 Research: When the state of security makes you WannaCry

InsightaaS: There has been a great deal of commentary on WannaCry, the worm that seemed poised to infect an enormous number of systems with...

Secrets of a CISO – Defining the security leader’s development path

A newly-published InsightaaS Industry Brief delivers an insider’s view of the building of a CISO Of all the challenges facing corporate IT planners, development of...

Spinning off or building up?

When Hewlett Packard Enterprise (HPE) announced a year ago that it was spinning off its enterprise services (ES) business and merging it with CSC...

Getting them young

We keep hearing that millennials want to work with tools that are familiar, as though that were something new. It's not. Everyone leans towards...

New tools for new breach reporting

Information professional professionals across the country have been considering the ramifications of new requirements in Canada’s Digital Privacy Act legislation slated to come into...

Competition or cyber security co-opetition

Competitors in many industries quietly cooperate when it makes sense, even if it's only by establishing and adhering to standards. Just think what the...

Happy International Women’s Day!

On International Women’s Day it’s important to draw attention to the ongoing need to protect and promote women’s equality. This need is global, but...