As organizations work to build a modern workplace, the resulting, often fragmented, landscape of tools and technologies reveals security, privacy, and operational gaps. Tap into our security ...
If you have previously registered, please check your email for your ticket and personalized link to the event. If you are new here, please register at the link below and you will be sent a ticket.
If you have previously registered, please check your email for your ticket and personalized link to the event. If you are new here, please register at the link below and you will be sent a ticket. Try ...
This second article of the Understanding Cybersecurity on Smartphones (UCS-Sph) series delves into Microsoft’s Windows Phone, a mobile OS that has undergone significant changes over the years. The ...
Smart contracts have transformed how legal agreements are managed and carried out, but they come with their own share of potential flaws and security risks. These shortcomings make smart contracts ...
North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches. Welcome to Cyber Security Today. It’s Friday May 3rd, 2024. I’m Howard Solomon, ...
While the roll-out of 5G across the country has been in the spotlight when it comes to connectivity, there’s another technology organizations should be considering (and potentially preparing for) that ...
What are Canadian companies actually doing in terms of projects with cloud and generative AI? How are they navigating the uncertainty of a relatively new technology? Those were the questions that were ...
A new report by the Dais at Toronto Metropolitan University reveals a significant wage gap between tech workers in the United States and Canada. According to the study, U.S. tech workers earn 46 per ...
Raphael Steinman, Co-CEO of Maxa, Alexis Steinman, Co-CEO of Maxa, Benoit Dageville, co-founder and president of products at Snowflake. Photo courtesy of Snowflake. Maxa, a Montreal-based startup that ...
Technology continues to play a significant role in accelerating cyberattacks and increasing their effectiveness, reflecting a global trend that sees cybercriminals growing in number and sophistication ...
Consider the following situation: an employer knows that their employee is working overtime. However, that employee did not request permission in advance to work overtime. When the employee ...