Ottawa CEO Francoise Gagnon on leadership, scaling up, and women in STEM
Working in the science, technology, engineering and mathematics (STEM) industries without having any type of formal training…
Refers to the software and hardware employed in securing information technology data and systems from intrusion and attack. This can range from end-point or perimeter security to data centre protection, sometimes delivered by appliance, as well as access control and application-level security.
Working in the science, technology, engineering and mathematics (STEM) industries without having any type of formal training…
Snapchat opens its platform up to third party developers, the 2018 World Cup is a testbed for…
Global application security provider High-Tech Bridge is launching a new channel program, and according to its CEO,…
All the latest sports tech news, including the NHL’s dive into using smart data-tracking pucks, DAZN winning…
As businesses demand the ease of public cloud but the security of on-premises cloud infrastructure, hybrid solutions…
PayPal has plans to acquire iZettle for $2.2 billion, EnStream, a joint venture between Rogers, Telus and…
Security incident and event management (SIEM) systems have a reputation for being hard to configure and tune.…
It takes a lot to stand out in a market where every tech company nowadays boasts security…
LAS VEGAS – Lenovo is on a journey of putting the customer first, and with 85 per cent…
Clarification: On May 17 Carleton University told ITWC that while an arrangement with the Canadian Cybersecurity Innovation…
Infosec leaders are often proud of the infrastructure they’ve built to protect their organizations. But at a…
New innovations continue to drive change within business, and as customers start demanding services like the cloud…
Security is an increasingly important aspect for any business, and SonicWall’s new offering is hoping to help…
BlackBerry may have stopped manufacturing hardware products like mobile phones, but it’s far from taking a step…
The question of how fast to apply Microsoft’s January 3 patches for the Meltdown/Spectre processor vulnerability —…