McAfee device to cloud ads

McAfee TV ad shows how it can protect enterprise data ‘from device to cloud’

McAfee has unveiled its first B2B ad campaign in more than 15 years, including a TV commercial and other assets that aim to shift its perception as an antivirus software provider to a firm that protects business professionals’ information from their devices to wherever it might reside in the cloud. The 30-second spot shows people […]

Simon Ferragne

Inside The Mind Of . . . Simon Ferragne

Simon Ferragne is president and CEO of Montreal-based TrackTik Inc. TrackTik’s boasts it is the industry’s only all-in-one security operations management software platform, offering security service companies complete control of every aspect of their business. TrackTik enables customers to streamline operations, and improve business development, through easy-to-use mobile and web-based technology, customized implementation, and technical […]

cryptocurrencies

Cryptocurrencies: What Merchants Need to Know

Let’s face it: You’re not much of an ecommerce merchant by today’s standards if you’ve still never heard of Bitcoin. After all, it’s been nearly a decade since the original cryptocurrency was first used in a transaction. There is, however, no shame in admitting that you don’t have more than a peripheral understanding of Bitcoin. […]

managed security services

How B2B Companies Outsource Managed Security Services

As security staff gets increasingly overwhelmed preparing for compliance audits and managing security incidents, B2B companies have started to ask about outsourcing managed security services. A recent report from analyst firm IDC found that Canadian organizations will become more reliant on third-party SaaS and managed security services by 2019. And Canadian chief information security officers (CISOs) will […]

Inside the rise of biometrics security

In the Star Trek universe, payments and identification are done through biometrics, the measurement of unique physical characteristics, such as fingerprints and facial features, for verifying identity with a high level of certainty. Customers pay for purchases at Quark’s bar on Deep Space Nine with a thumbprint, while Picard sets the Enterprise’s auto-destruct sequence with a voice command […]

Cytegic monitors cyber-security threats in real-time

Say you’re concerned about cyber-criminals hacking into your company’s back end. You’ve run risk assessments before but those reports take weeks to compile. You’re worried those assessments could come too late. What if you could diagnose cyber-security attacks in real-time and be notified immediately of potential solutions? Those are the questions a new Israeli startup will gladly […]

Beyond the hype: Get ready for the Internet of Things

The Internet of Things has reached peak buzz. Gartner placed IoT at the very pinnacle of its 2014 Hype Cycle for emerging technologies, and it’s little wonder why. For years now, technology executives, “thought leaders” and especially marketers have loved to talk about the seemingly futuristic concept of a global nervous system of networked, intelligent sensors. The implications […]

13 things you need to consider before bringing your business to the cloud

Individuals, businesses, non-profit organizations and schools are heading to the cloud. The innovation in the cloud-computing industry is emphatically transforming the workplace as a greater abundance of data is being stored. Data is being accessed from anywhere and everywhere and the way workers are performing their job duties is evolving. The cloud era is here […]