IT Management

IT Management

Building cloud security from the end up

In the spring of 2009, Gartner identified data security as one of the top five inhibitors to broader adoption of cloud computing. Research commissioned...

Who can you trust?

Technology, like any tool, can be used well or badly. Sometimes the bad is malicious, and sometimes it's just the result of laziness, carelessness,...

Heartbleed should be making you sweat

It’s been a couple of months since news of the Heartbleed vulnerability first spawned global near-hysteria. The bug, which sat virtually unnoticed on approximately...

Digitization driving healthcare necessity and invention

A key beneficiary of the transformative impact of IT, healthcare is undergoing massive change. Like many other industries, this sector is renovating to set...

CASL and e-communications in Canada: in pursuit of the Dark Ages

Context: For many of us, the 1990s don’t seem like a very long time ago — but from a work mode perspective, they are almost...

Do you need a DRP for winter?

For anyone responsible for purchasing deploying, maintaining or even using technology in anything remotely approaching a business setting — meaning all of us —...

The Power to do More security

Dell’s conversation with customers is changing. With a nod to the company’s continued strength in PC, server and data centre markets, in his address...

Bleeding Hearts

So much can change in a week. A scant few days ago, people believed that seeing that little padlock on a website's address bar...

The Internet Manifesto

The Internet is a mixed blessing. It connects us to the world, and the world to us. That's good. And that's bad. Like any...
John McClurg, VP and chief security officer, Dell Inc.

Dell security chief on the "three Cs"

Very few IT interviews begin with a discussion of hermeneutics, but Dell’s chief security officer is not your average corporate officer. A onetime student...

The RSA Security – NSA Controversy

When RSA Security's executive chairman, Art Coviello, stepped on stage at the company's recent conference, he was facing an audience that wasn't exactly friendly. The...

Will COPE save BYOD? Should it?

Carmi Levy is a well known Canadian journalist/analyst with a deserved reputation for offering commentary across a range of IT issues and technology opportunities....

Genetec layers security on security

Beyond their intrinsic value as a showcase for new technology implementation, case studies provide additional value. By demonstrating the art-of the-possible, they enable businesses...

Data trade and the shadows of the times

InsightaaS: Ten days after publishing this post focused on the ripples resulting from the Snowden revelations, we were contacted about a recent Business Software...

Dell tackling security complexity with Connected solutions

When asked about IT challenges, a conditioned response for vendor organizations is to think in terms of product sets — networking gear, storage portfolios, servers...