loading...
BYOD strategies: Governance, policy and security
4 min read
BYOD is hot! But is it for you? If yes, which flavor would be applicable?
A path for securing critical infrastructure
4 min read
Protecting critical infrastructure from cyber threats is the shared responsibility of the federal government, the provinces and territories and the...
Are we ready for the cyber employee?
2 min read
In numerous interviews with senior military commanders over the past several years, Vanguard magazine has often posed the question: what...
Targeted attack: Spear phishing for intelligence
10 min read
In early February, James R. Clapper, the U.S. director of national intelligence, told the House Select Intelligence Committee that threats...
Going mobile: Ten best practices for managing mobile devices
6 min read
The widespread adoption of mobile devices as enterprise-level tools is occurring as compliance is becoming an ever-increasing concern.
Fragile states, good governance promotion, and comprehensive security
6 min read
CGE Vol. 14 No.4 April 2008 In recent years, policy makers in the North have become all too aware of...
A call to action for innovative security leadership
6 min read
CGE Vol.13 No.2 February 2007 Public security, once a task relegated to the "guns and badges" folks in our public secto
Protecting the public from the pirates of privacy
6 min read
The changing face of public and personal privacy in the face of social media, data clouds and global security challenges...
Cyber attack: Why you might be a target
4 min read
Cyber attacks don't have to look highly sophisticated. Hackers are purposely making them innocuous so that unsuspecting users will click...
Shared Services Canada offers opportunity for effective information system security
4 min read
The announcement regarding the establishment of Shared Services Canada (SSC) was guardedly encouraging news for asset protection and security (AP&S)...