loading...
BYOD strategies: Governance, policy and security
4 min read
BYOD is hot! But is it for you? If yes, which flavor would be applicable?
A path for securing critical infrastructure
4 min read
Protecting critical infrastructure from cyber threats is the shared responsibility of the federal government, the provinces and territories and the...
Are we ready for the cyber employee?
2 min read
In numerous interviews with senior military commanders over the past several years, Vanguard magazine has often posed the question: what...
Targeted attack: Spear phishing for intelligence
10 min read
In early February, James R. Clapper, the U.S. director of national intelligence, told the House Select Intelligence Committee that threats...
Going mobile: Ten best practices for managing mobile devices
6 min read
The widespread adoption of mobile devices as enterprise-level tools is occurring as compliance is becoming an ever-increasing concern.
A call to action for innovative security leadership
6 min read
CGE Vol.13 No.2 February 2007 Public security, once a task relegated to the "guns and badges" folks in our public secto
Fragile states, good governance promotion, and comprehensive security
6 min read
CGE Vol. 14 No.4 April 2008 In recent years, policy makers in the North have become all too aware of...
Shared Services Canada offers opportunity for effective information system security
4 min read
The announcement regarding the establishment of Shared Services Canada (SSC) was guardedly encouraging news for asset protection and security (AP&S)...
Masada: Lessons for cyber defence
7 min read
There was probably a day in spring of AD 72 that Eleazar ben Ya'ir, commander of Masada, woke up completely...
A duty to care
6 min read
What role should governments and public servants play in safeguarding personal information?