Whether it’s a border wall or a frontline trench in wartime, security has always involved a demarcation. This concept has informed computer security from...
Think about how IT professionals used to set up and assemble computers: they configured hardware, booted machines, and when prompted, installed the OS and...
The Government of Canada’s Information Technology Strategic Plan 2016-2020 lays out policies and procedures required to mitigate the risk of significant cyber security events....
The highlight of BlackBerry’s last quarter was its announcement that it would stop making smartphones directly. While the company will earn a royalty on their sales, profit will mean less for the Mobile device management software maker.