|
|
|
|
|
|
|
@{mv_date_MMM d, yyyy}@ |
|
|
A group supporting multiple churches across the country in court challenges against COVID-19 public health orders is apologizing after hiring a private investigator to follow a Manitoba judge.
» Read full article
Companies looking to purchase insurance against cyberattacks in which their data is held for ransom will soon find it more expensive and difficult to obtain, a cybersecurity expert says.
» Read full article
RCMP said in a news release Monday that investigators completed a "fulsome search" of an area near Lytton that is about 1 km in radius.
» Read full article
|
|
|
|
|
|
|
Since the control room acts as a person’s “eyes and ears,” the design of it is extremely important. When designing a control room, it’s critical to consider all factors, for example, equipment selection, operating practices, working environments and furniture choices. In addition to the design of a workstation, operators within the control room must be considered. The overall system will fail if operators are overloaded, undertaking tasks for which they are poorly trained or straining to read displays that are illegible. It is necessary to identify the limitations of the operator to minimize potential mismatches between user capabilities and system demands.
» Learn more |
|
|
|
Top 10 Under 40 winner Luana Pascu, cybersecurity researcher, Flare Systems, reflects on what this recognition means at this stage in her career and the power of mentorship.
» Watch the video |
|
|
|
Join IBM IAM expert Evan O'Regan as he shares his experience in how he has guided clients successfully on their Customer Identity Access Management (CIAM) and Zero Trust journeys.
Evan shares insights on how to identify and prioritize key activities, how to detect early and avoid the common CIAM and Zero Trust pitfalls that often signal eventual failure for the program, as well as how to align your CIAM and Zero Trust business case for success.
This discussion will cover a pragmatic understanding of CIAM and Zero Trust, and how to apply these principles in practice as organizations start or progress their strategy across domains such as Customer Identity and Access Management, Infrastructure and Endpoint, and in securing their Hybrid Cloud environment.
» Register now |
|
|
|
The security industry and its solutions have grown beyond reactive firefighting in IT, as this is an antiquated view of cybersecurity’s role in business.
» Read full article
The federal government is setting new guidelines that work national security considerations into funding criteria for university research.
» Read full article
Privacy commissioner Daniel Therrien referred the matter to the Federal Court after a man alleged Google was breaching Canada’s privacy law by prominently displaying links about him when his name is searched.
» Read full article
|
|
|
|
Location: Las Vegas, Nev.
Date: July 19-21, 2021
» More Info
Location: Woodbridge, Ont.
Date: August 16, 2021
» More Info
|
|
| |