451 Research: When the state of security makes you WannaCry
InsightaaS: There has been a great deal of commentary on WannaCry, the worm that seemed poised to infect an enormous number of systems with...
Secrets of a CISO – Defining the security leader’s development path
A newly-published InsightaaS Industry Brief delivers an insider’s view of the building of a CISO
Of all the challenges facing corporate IT planners, development of...
Spinning off or building up?
When Hewlett Packard Enterprise (HPE) announced a year ago that it was spinning off its enterprise services (ES) business and merging it with CSC...
Getting them young
We keep hearing that millennials want to work with tools that are familiar, as though that were something new. It's not. Everyone leans towards...
New tools for new breach reporting
Information professional professionals across the country have been considering the ramifications of new requirements in Canada’s Digital Privacy Act legislation slated to come into...
Competition or cyber security co-opetition
Competitors in many industries quietly cooperate when it makes sense, even if it's only by establishing and adhering to standards. Just think what the...
Happy International Women’s Day!
On International Women’s Day it’s important to draw attention to the ongoing need to protect and promote women’s equality. This need is global, but...
Unhelpful help
In the beginning was the manual. There had to be – there was no online help, or even much assistance embedded in software. You...
Betakit – An Open Letter from the Canadian Tech Community: Diversity is our Strength
“The Canadian tech community comprises many different nationalities, religions, sexual orientations, gender identities, mental and physical abilities, and perspectives. We believe that this diversity...
Citizen everything
We live in a world where lines are blurring between professionals and amateurs. Except we're no longer calling them "amateurs" – they're now "citizen"...
Lenovo Yoga Book review
There are many laptops and convertibles on the market, and they're all variations on a theme. These days, that theme includes skinny and light...
Improved into oblivion
There was a day when computers and other devices connected happily to accessories, and ease of connection mattered. It appears that those days are...
How Linux took over the world
The computing world is never a dull place, and sometimes the most innocuous-seeming things turn into monsters. Consider, for example, the Linux operating system.
Twenty-five...
FIDO progress on passwords
Since the early iterations of user names and passwords, the road to creating a simple but secure online experience has been a long and...
Year of the bots
When most of us hear the term ‘bot’, we think of the infamous botnets that bombard us with malware-laden spam or deliver automated denial...