HomeSecurity

Security

Going deep inside the SOC

Managed security services is attracting attention as companies opt to outsource part of their network monitoring to vendors such as Symantec in the war on digital terror

rn

Preparing for PIPEDA’s arrival

While the deadline for compliance with the Personal Information Protection and Electronic Documents Act was Jan. 1, most organizations in Canada will find themselves scrambling to catch up if they haven't already complied

Piracy watchdogs fine eight firms for unlicensed software

Washington-based group worked with Canadian agencies to bring about charges totalling $330,300rn

Reporting of security incidents ‘credibility issue’

Technology is a catalyst to improve business processes, says Nortel's CIO

All roads meet at the NEXUS

The quick-stop cross-border program is ready to allow travellers through Quebec. Find out how the technology is helping to reduce wait times from two hours to 15 seconds

CAAST clamps down on eight Canadian companies

The group reaches $330,300 in settlements with software pirates in Ontario and Alberta. Plus: the Business Software Alliance on why there's more piracy here than in the U.S.

Social engineering holds clue to security leaks: expert

Maritime conference looks at lack of governance, IT gaps

Frequent patches, user violations all play a role in poor network security

Companies that use several different types of network security devices are often doing the same task several different times

If security keeps you up at night, take this pill

A sound security policy should be a living document that changes with your companyrn

SOC hop

Symantec is tracking weapons of mass destruction and finds thousands every day. But it's worms, viruses and blended threats that the company is after. We take you though a guided tour of its security operation centre

Why’s that guy taking so long in the company restroom?

The current round of wireless gear can pose a threat to securing valuable corporate data.

Canadian security lab to probe computational complexity

With existing products failing to keep viruses out of the enterprise, Carleton University and Cloakware look past cryptography to take a component-level view of network vulnerability

Electronic frontier not quite the promised land

Hackers are a pain, but adware and spyware are making me lose my taste to surfrn

No lock on security

If there's one topic IT types don't easily tire of it's security. A rash of virus and worm activity this past summer underscored, yet...

Patch management costs spiral to US$19 million: ISS

All-in-one security devices could be the answer, exec says

Popular Posts

Security Blogs

Slideshows

How to equip students with the tools to succeed

Many teams used to spend the entire summer updating student devices. But now the Windows 10 ability to manage the devices without having to...

Stay cyber-safe this holiday season

The holidays are a busy time of year, packed with family gatherings, festive parties and hours spent lining up in crowded stores to buy...

How upgrading your network can deliver a competitive advantage

In 2014, Gartner reported that the average cost of network downtime to an enterprise was $5,600 per minute. And even if the network isn't...

The top three network security challenges for 2016

Securing the network has always been a challenge, but it’s only getting more complex, thanks to the rise of cloud applications, programmable networks and...