As the retail industry continues to go through a dramatic digital transformation, the role of the CIO has never been more important. With the increasing pace of change and complexity in technology and the numerous operational challenges such as supply chain, cost containment, security and more, retail IT organizations require skills and experience that combine […]

If you pay attention to the world of security you’ve probably heard about the upswing in a type of attack known as Malvertising. Data Breach Today and Dark Reading recently featured articles on the subject. If you haven’t heard of it, Malvertising is the practice of inserting corrupted advertisements into trusted web sites, making them look […]

Higher education institutions have been dealing with BYOT for some 15 years, making them pioneers of this massive technology transformation. At the beginning of every new semester, university and college IT departments experience a tremendous spike in device on-boarding activity. You have thousands of students who all want to get their various devices – smart […]

Scott Penney, Director of Cyber Security Solutions at BlueCat, talks about the mass cyber attack on Dyn and how you can protect your network with the Power of DNS Recently the world experienced a cyber attack that had a profound impact on many companies’ ability to provide services to their customers and their internal constituents.  […]

For today’s technology leader, it’s no longer a question of whether you’ll integrate cloud deployments into your IT infrastructure. In fact, for many it’s no longer even a question of when. The time to build and implement cloud strategies is now. Earlier this year an IDC survey of over 6,000 IT organizations revealed that nearly […]

It’s official, BlueCat is now certified as a GREAT WORKPLACE by Great Place to Work® Canada. Earning this achievement was no small feat – the process involved a thorough and independent analysis of anonymous employee feedback and an assessment of workplace practices and programs. “In the last few years, BlueCat’s growth has exploded, in both […]

Dwell time is arguably the most accurate indicator of an enterprise’s security. It can determine how good you are in finding and eliminating actual breaches. Some indicators are less reliable. For example, the number of breached systems might either indicate your systems are well protected or, it might mean there are gaps in your ability […]

Many of you may have recently seen what appear to be zombies roaming the planet in search of their next victim.  While their glazed expressions, constant twitching, and lack of awareness of their surroundings may make you think they’re zombies, they’re actually more likely playing the latest mobile gaming sensation – Pokemon Go. Pokemon Go […]

Security continues to be top of mind for all organizations. Threats are more pervasive, sophisticated and appear as headlines in the news on a regular basis. According to Symatec’s Annual Internet Security Threat Report, 430 million new malware variants were discovered in 2015 alone[1]. As a result, BlueCat’s Director of Cyber Security Solutions, Scott Penney, […]

Think about how many times each day you pull a credit or debit card out of your wallet to pay for gas, groceries, a cup of coffee, or a new pair of shoes. Now, think about how many times each week you make online purchases. If you’re a frequent shopper on a particular website, you […]

Scroll Up