Tags #security

Tag: #security

CenturyLink takes Managed Security Services 2.0 to APAC

Not all markets are created equal; and not every sales approach will resonate with certain audiences. This was something that CenturyLink kept in mind...

McAfee expands machine learning, automation capabilities to strengthen human-machine teams

McAfee today released Disrupting the Disruptor, Art or Science?, a new report comparing the role of humans to automation and machine learning in the...

Held for Ransom and WannaCry

Ransomware is big business. In early May, the UK's National Health Service (NHS), along with hundreds of other organizations worldwide, was crippled by a massive...
Bridging iot

Information Builders talks next steps in leveraging IoT data

Presenters at the latest Information Builders breakfast seminar, Powering IoT with an Information Management Strategy, provided a comprehensive view of what it will take...

Secrets of a CISO – Defining the security leader’s development path

A newly-published InsightaaS Industry Brief delivers an insider’s view of the building of a CISO Of all the challenges facing corporate IT planners, development of...

SDN: networking in the cloud era

Cloud computing is a done deal. Virtually all organizations now use cloud in one form or another: the value proposition of SaaS is no...

Getting them young

We keep hearing that millennials want to work with tools that are familiar, as though that were something new. It's not. Everyone leans towards...

Kantara initiative joins European Trust Foundation

WAKEFIELD, Mass., USA – April 4, 2017 -- Kantara Initiative announced today that it joined the European Trust Foundation to help its non-European Union...

New tools for new breach reporting

Information professional professionals across the country have been considering the ramifications of new requirements in Canada’s Digital Privacy Act legislation slated to come into...

Fat fingers

When a large portion of the World Wide Web suddenly ceased to function recently, it was a wakeup call. Fifty-four of the top 100...

IoT security fundamentals: what risk, why care and who’s driving?

The glow surrounding IoT is beginning to fade as organizations come to face one of the key challenges in its implementation – the need...

Competition or cyber security co-opetition

Competitors in many industries quietly cooperate when it makes sense, even if it's only by establishing and adhering to standards. Just think what the...

Car clouds and data networks – the Ethernet game is on

Celebrated as a “data centre on wheels,” the modern car is more software than ‘hardware’, and kicks off an enormous amount of data that...

CIA Plus Meetup tackles IoT privacy and security

The most recent CIA Plus Meetup in Toronto touched on subjects that are becoming of prime concern to the security community. Entitled Who’s Big...

In Canadian cloud, plus ça change

Over the past year, the cloud marketplace in Canada has experienced profound change. While XaaS adoption has accelerated across the size and industry spectrum,...