Tags #security

Tag: #security

Is Blockchain the key to our IoT security future?

There are plenty of proponents who see Blockchain as more than a platform for the financial institutions of this world. Consultant Mark Kovarski is...

City of the future to run on code

Oman’s director of ICT research Ali Al Shidhani outlined the increased risk associated with urban IoT – providing recommendations to help Smart Cities stay...

Boots on to drive IoT adoption

The Internet of Things (IoT) is a hot, hot topic today, not only because it's something new and interesting, but because it has the...

Reducing Risk in IIoT

What is a “Security Framework” and how can it help protect against the unique threat landscape that is evolving with the Industrial Internet of...

Cross-Cloud across Canada

Shawn Rosemarin’s experience in the tech industry has been broad and deep. His career spans implementation with SAP and sales with IBM and Dell,...

FIDO progress on passwords

Since the early iterations of user names and passwords, the road to creating a simple but secure online experience has been a long and...

Analytics may boost network security

Security is top of mind for most of us. Everyone, it appears, is out to do evil, and to make a profit from it....

Nowhere to hide: Nuix Voice speeds audio and video analytics

Nuix, an information protection and security intelligence provider, has announced its partnership with voice analytics vendor Voci Technologies. Under the terms of the agreement, the...
Bitcoin, blockchain and banking: the "ValueWeb"

Bitcoin, blockchain and banking: the “ValueWeb”

As former president of IDC Canada and marketing director with the Canada Systems Group, reviewer Paul Kennedy has long term experience with both technology...
451 Research: IoT security M&A, Part 2

451 Research: IoT security M&A, Part 2

IoT presents a compelling demonstration of fragmentation in emerging markets. While IoT solutions combine a mix of components from multiple vendors across the ICT...

Interac tokens transit to IBM cloud

There’s a first time for everything, as they say. That’s certainly the case for Interac as it breaks from tradition to bring its latest...

Vitamin Y: VMware’s “transition year”

Context: Pat Gelsinger was in town this month on what is emerging as a regular bi-annual tour to talk with major Canadian customers. While...

Know thyself, know thy enemy

Sometimes a new lens can show an age-old problem in a clearer light. At least that’s the thinking behind a new white paper from...

Are passwords really passé?

Future proofing anything is a monumental challenge in the IT world these days. Identification and authentication are areas that are especially problematic. For every...

Held for Ransom

Within the past month, several high-profile attacks have brought an increasingly popular form of malware into the public eye. It’s known as ransomware, and...

Research and Resources