Block hackers by learning the 7-step ‘kill chain’ method

Hackers and cybercriminals are becoming savvier, with the bulk of their attacks now aimed at specific targets, according to a new report from security solutions provider Websense Inc. Instead of launching Hail Mary-esque

Published on: April 2nd, 2014 Candice So

How the cloud can improve security: Courtot

SAN FRANCISCO - After the warnings about the cloud and its potential threats to security, it seems counter-intuitive to say the cloud can actually help businesses shore up the security of their data.

Published on: February 27th, 2014 Candice So

One shared database in security’s future: Trilling

SAN FRANCISCO – With all the weekly headlines about new malware, dangerous threats, and unforeseen attack vectors, it might be easy to believe that hackers will soon be the victors of the cybersecurity

Published on: February 27th, 2014 Candice So

Canadians not protecting smartphone data with BYOD, Symantec study finds

Canadian consumers and small businesses are taking some serious risks in failing to guard their smartphones and their data, according to a new study from Symantec Corp. Releasing its 2013 Norton Report yesterday,

Published on: October 2nd, 2013 Candice So

5 ways to monitor your employees legally and ethically

Employers have the right to monitor employee use of office equipment - especially computers - to ensure these tools are being responsibly used for work.In these tough times, this is a right resource-stretched

Published on: February 23rd, 2010 Tony Bradley

Eight hot-button issues to watch for in ’08

Ready for 2008? Budgets may tighten, but IT's challenges will just keep growing: security problems, virtualization technology, legal issues, users who can't be stopped and that worrisome baby-boomer brain drain. Here are eight

Published on: January 3rd, 2008 Frank Hayes