Going mobile: Ten best practices for managing mobile devices

In Security On July 9, 2012 0 340 0

The widespread adoption of mobile devices as enterprise-level tools is occurring...

A call to action for innovative security leadership

In Security On May 7, 2012 0 400 0

CGE Vol.13 No.2 February 2007 Public security, once a task relegated...

Fragile states, good governance promotion, and comprehensive security

In Security On May 7, 2012 0 334 0

CGE Vol. 14 No.4 April 2008 In recent years, policy makers...

Cyber attack: Why you might be a target

In Security On May 7, 2012 0 450 0

Cyber attacks don’t have to look highly sophisticated. Hackers are purposely...

Shared Services Canada offers opportunity for effective information system security

In Security On May 7, 2012 0 357 0

The announcement regarding the establishment of Shared Services Canada (SSC) was...

Masada: Lessons for cyber defence

In Security On May 7, 2012 0 323 0

There was probably a day in spring of AD 72 that...

Protecting the public from the pirates of privacy

In Security On May 7, 2012 0 374 0

The changing face of public and personal privacy in the face...

Sécurité des réseaux : l’approche multicouches

In Security On May 7, 2012 0 324 0

L’univers de la sécurité des TI évolue rapidement. À mesure que...

A duty to care

In Security On May 7, 2012 0 381 0

What role should governments and public servants play in safeguarding personal...

Network defence: Layering the security solution

In Security On May 7, 2012 0 336 0

The world of IT security is rapidly evolving. As quickly as...