Find secrets hidden in the recesses of your PC with Identity Finder

My laptop was a ticking time bomb. Deep within a nested hierarchy of folders in the machine's My Documents folder, in an archive eight levels down, sat 722 Social Security numbers. For nearly

Published on: May 14th, 2010 Robert L. Mitchell

Judge throws out data breach lawsuit saying no harm was done

A federal court in Missouri has thrown out a consumer class-action lawsuit that was brought against pharmacy benefits company Express Scripts over a 2008 data breach in which millions of customer records were

Published on: December 7th, 2009 Jaikumar Vijayan

Blackjack pro shows business leaders how to make smarter decisions

When Jeffrey Ma was asked by the Portland Trail Blazers to help the team make more data-driven decisions, he knew there would be ups and downs along the way.The professional Blackjack player –

Published on: November 20th, 2009 Brian Jackson

SAP helps Edmonton get the 411 on 311


Published on: May 21st, 2009 Brian Jackson

Musician creates stunning, information-rich virtual world

Jaque Davison has used virtual world technology to build an Infosphere – a dense, 3D structure of information that allows anyone to easily access the research they need about Africa. Whether it's pirate

Published on: May 5th, 2009 Brian Jackson

The three privacy assumptions you’re wrong about when it comes to data

Business travelers will soon need to carry the name of their corporate lawyer in addition to their passport when returning home to the United States, and they may need to bring with them

Published on: October 14th, 2008 David Strom

‘People are the new perimeter’ says Intel

Intel Corp. employees received a suspicious e-mail message one day from an unknown third-party company that claimed to be conducting a survey on behalf of the human resources department. Phishing scan red flags

Published on: September 18th, 2008 Brian Jackson

Search and you often don’t find…and here’s the reason why

Some call it "findability" – the art or science of making content in an organization "findable." And many big businesses haven't figured how to do that yet. Their employees often can't locate the

Published on: June 27th, 2008 Brian Jackson

Five easy ways to burglar-proof your laptop

Theft of laptops and other mobile devices is spiraling, and the consequences – financial and other – are getting increasingly dire.These two disconcerting realities are attested to by survey findings from a range

Published on: June 4th, 2008 Nestor Arellano

Wanted – CIOs who are business leaders, not button-pushers

Canadian CIOs see their role shifting to focus more on business leadership and less on the daily mundane tasks of tech support, but don't quite think they're ready for the job yet, according

Published on: May 9th, 2008 Brian Jackson

Protecting company data from the enemy within – experts show you how

Jump to: videoThe insider threat is the top security issue companies should be concerned about, say security experts from Plano, Texas-based Electronic Data Systems (EDS) Corp.Confronting this threat requires a smart combination of

Published on: May 1st, 2008 Brian Jackson

Canadian CIOs share creative ways of handling information avalanche

Nick Bontis wasn't totally surprised his two-year-old's first word was “Blackberry,” since the director of the Hamilton-based Institute for Intellectual Capital Research Inc. usually has one glued to his palm.The popularity of the

Published on: April 18th, 2008 Brian Jackson

Online crooks target government Web sites for phishy tax refunds

Stealing money through fraudulent tax refunds was the main purpose of phishing activity targeting government Web sites during the month of February. This was a finding of "The State of Phishing" monthly report

Published on: March 28th, 2008 Joaquim P. Menezes