The temptations of data may be too great to resist
Living online with all the free stuff (content, storage, data, assistance, education, health advice, whatever) is great…
Refers to the software and hardware employed in securing information technology data and systems from intrusion and attack. This can range from end-point or perimeter security to data centre protection, sometimes delivered by appliance, as well as access control and application-level security.
Living online with all the free stuff (content, storage, data, assistance, education, health advice, whatever) is great…
In the mobile app world, when hackers want access to personal information, they need simply ask. This…
Smartphone case maker Vysk says that handset manufacturers may be hesitant to step up security as it…
The rumour coming into the HP Discover conference in Barcelona was that the vendor would not be…
Chip making giant Intel has confirmed it will acquire PasswordBox, a Montreal-based vendor of cross-platform identity management…
In this edition of the CDN Digital magazine Cheryl Cook, Dell channel chief, outlines the vendor’s $125 million channel…
With electronic and online shopping predicted to be at an all-time high this holiday season, Canadian consumers…
It’s easy to dismiss Cirius Messaging Inc. as a small young company with a good idea. Founded…
When he was on assignment for the FBI in its Los Angeles field office, John McClurg was…
LAS VEGAS – It happens every day in almost every work environment in the world. The IT…
LAS VEGAS – Historically security selling strategies were predominantly based on the FUD factor – fear, uncertainty…
LAS VEGAS – Now that McAfee is firmly committed going forward to branding itself as Intel Security,…
LAS VEGAS – Chris Young, the executive who spearheaded Cisco’s acquisition of SourceFire, was lured over to…
Approximately 70 per cent of managed services providers still need to adapt services to properly take advantage…
Cloud computing and mobility have been in the headlines recently, but not for showing how enterprises use…