loading...
BYOD strategies: Governance, policy and security
4 min read
BYOD is hot! But is it for you? If yes, which flavor would be applicable?
A path for securing critical infrastructure
4 min read
Protecting critical infrastructure from cyber threats is the shared responsibility of the federal government, the provinces and territories and the...
Are we ready for the cyber employee?
2 min read
In numerous interviews with senior military commanders over the past several years, Vanguard magazine has often posed the question: what...
Targeted attack: Spear phishing for intelligence
10 min read
In early February, James R. Clapper, the U.S. director of national intelligence, told the House Select Intelligence Committee that threats...
Going mobile: Ten best practices for managing mobile devices
6 min read
The widespread adoption of mobile devices as enterprise-level tools is occurring as compliance is becoming an ever-increasing concern.
A call to action for innovative security leadership
6 min read
CGE Vol.13 No.2 February 2007 Public security, once a task relegated to the "guns and badges" folks in our public secto
Fragile states, good governance promotion, and comprehensive security
6 min read
CGE Vol. 14 No.4 April 2008 In recent years, policy makers in the North have become all too aware of...
A duty to care
6 min read
What role should governments and public servants play in safeguarding personal information?
Sécurité des réseaux : l’approche multicouches
6 min read
L'univers de la sécurité des TI évolue rapidement. À mesure que de nouvelles technologies voient le jour, les pirates informatiques...
Network defence: Layering the security solution
6 min read
The world of IT security is rapidly evolving. As quickly as new technologies emerge, the digital underground develops a new...