IT Management

How can we fix stupid?

0
Hanlon's Razor says, "Never attribute to malice that which is adequately explained by stupidity." In the wake of the Equifax data breach, 145.5 million...

ReMAPping value networks: only in Canada, eh?

0
Software may be eating the world, but when combined with hardware, it has potential to unleash new productive capacity, while ensuring that the fruits...

Spammers an enterprise unto themselves

0
The business world operates according to many well-entrenched patterns. Work schedules are defined based on labour and customer demands; a majority of day-to-day business...

Fintech gaining serious street cred

0
Fintech has become a major entry in the buzzword lexicon in recent years. While not a new concept – in fact, some consider fintech...

The future of encryption

1
What does a simultaneously dead and not-dead cat have to do with cybersecurity? Quite a bit, as it turns out. Schrödinger's quantum kitty is the...

Cyber security lessons from the energy community

0
Any widespread disruption of electricity, water or gas can have huge impact on day-to-day life. Critical infrastructure must be failsafe, protected and resilient –...

Held for Ransom and WannaCry

0
Ransomware is big business. In early May, the UK's National Health Service (NHS), along with hundreds of other organizations worldwide, was crippled by a massive...

Acceleration labs bridge the gap between incubation and commercialization

0
In today’s fast-paced technology environment, it’s not always easy for a large-scale enterprise to fast track an innovation agenda. While there are new ideas...

Digital transformation – new capability or new core?

0
For the past while, pundits have been telling us that every company will become an IT company, and, more recently, that every company will...

General Data Protection Regulation: from the EU with love

0
If you think that you're safe from needing to be compliant with the European Union's upcoming General Data Protection Regulation (GDPR), think again. If...

451 Research: When the state of security makes you WannaCry

InsightaaS: There has been a great deal of commentary on WannaCry, the worm that seemed poised to infect an enormous number of systems with...

Secrets of a CISO – Defining the security leader’s development path

0
A newly-published InsightaaS Industry Brief delivers an insider’s view of the building of a CISO Of all the challenges facing corporate IT planners, development of...

Spinning off or building up?

0
When Hewlett Packard Enterprise (HPE) announced a year ago that it was spinning off its enterprise services (ES) business and merging it with CSC...

Getting them young

0
We keep hearing that millennials want to work with tools that are familiar, as though that were something new. It's not. Everyone leans towards...

New tools for new breach reporting

0
Information professional professionals across the country have been considering the ramifications of new requirements in Canada’s Digital Privacy Act legislation slated to come into...