Digital transformation never stops at IBM’s semiconductor plant in Québec

Digital transformation never stops at IBM’s semiconductor plant in Québec

Technological innovation is at the heart of IBM Bromont. Founded in 1972 to meet the needs of the Canadian computer market, the plant has evolved over the years to climb the hierarchy of the computer behemoth – setting itself apart from competitors who have fled North America to Asian countries in the last decades. Today, IBM assembles and tests its semiconductor solutions in the quaint town of Bromont, an hour from Montréal, and provides services…

Read More

À l’usine de semi-conducteurs d’IBM au Québec, la transformation numérique est permanente

À l’usine de semi-conducteurs d’IBM au Québec, la transformation numérique est permanente

L’innovation technologique est au cœur d’IBM Bromont. Fondée en 1972 pour répondre aux besoins du marché canadien en ordinateurs, l’usine a évolué au fil des ans pour grimper les échelons de la hiérarchie du colosse informatique – se démarquant de l’ensemble de ses concurrents qui ont tous fui l’Amérique du Nord vers l’Asie dans les dernières décennies. Aujourd’hui, c’est dans la coquette ville de Bromont, à une heure de Montréal, qu’IBM fait l’assemblage et les…

Read More

How traditional security tools fail to protect companies against ransomware

How traditional security tools fail to protect companies against ransomware

Most organizations surveyed by Titaniam have existing security prevention and backup tools, but almost 40% have still been hit by ransomware attacks in the last year. Credit: Adobe Traditional cybersecurity products were once enough to protect organizations against viruses and hacking attempts. But today’s cyber threats are more prevalent, more sophisticated and more destructive, requiring more robust security defenses. A report released Thursday by cybersecurity firm Titaniam looks at the inability of traditional security products…

Read More

Employee wellbeing matters: treat your customers like your staff

Employee wellbeing matters: treat your customers like your staff

Digital transformation, AI, data mining and the cloud drive efficiencies and improve customer engagement. An estimated 46% of customer interactions are already automated, with the trend toward automation having further accelerated during the pandemic.  However, as chatbots pick off the simpler queries, contact centre staff are taking the strain having to deal with more complex customer enquiries. This can take a toll on advisors’ mental and emotional wellbeing.  Agent attrition is 15% (average) across UK…

Read More

Former Canadian Government IT Worker Pleads Guilty Over NetWalker Ransomware Attacks

Former Canadian Government IT Worker Pleads Guilty Over NetWalker Ransomware Attacks

An ex-Canadian government employee pleaded guilty in Florida court earlier this week to charges of involvement with the NetWalker ransomware group. Sebastien Vachon-Desjardins, 34, was accused of conspiracy to commit computer fraud and wire fraud, as well as intentional damage to a protected computer and transmitting a demand concerning damaging a protected computer. Vachon-Desjardins was extradited in March, following the launch of a US global action against the NetWalker cyber-criminal gang in January. “Between May 2020 and January 2021, the…

Read More

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus New information and technical details, including a proof-of-concept have been published for a remote code execution flaw in Zoho ManageEngine ADAudit Plus that was patched last month. Background On June 29, researchers at Horizon3.ai published a blog post about a recently disclosed vulnerability in Zoho ManageEngine ADAudit Plus, a compliance tool that monitors Active Directory (AD). Product Vulnerability Description CVSSv3 Score VPR* Zoho ManageEngine…

Read More

What IT loves about Webex Control Hub

What IT loves about Webex Control Hub

In collaboration with Fernando Quintanilla, Ervin Carrillo, and German Cheung We work from just about anywhere. Coffee shops, airplanes, kitchen tables. The nature of our work is hybrid and when we aren’t in shared spaces with our colleagues, we rely on our collaboration suite to keep us connected. As the collaboration leader for video endpoints across Cisco, my day revolves quite heavily around Webex and delivering consistent collaboration experiences to Webex users. As we work…

Read More

Defining data privacy, residency and sovereignty in the cloud

Defining data privacy, residency and sovereignty in the cloud

Data sovereignty. A simple notion, right? Not so fast. What may appear to be a relatively straightforward concept has instead become an extremely complicated situation due to the numerous regulations defined, countless re-purposed terms used, and the variety of technology capabilities offered. This reality has an impact downstream in the form of significant considerations and ramifications for public and private organizations alike. To begin to simplify this complexity, let’s start with the definition of the…

Read More

Lessons learned from slew of recent data breaches

Lessons learned from slew of recent data breaches

<!– Lessons learned from slew of recent data breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Top of Mind Security Insights from In-Person Interactions

Top of Mind Security Insights from In-Person Interactions

The past few months have been chockfull of conversations with security customers, partners, and industry leaders. After two years of virtual engagements, in-person events like our CISO Forum and Cisco Live as well as the industry’s RSA Conference underscore the power of face-to-face interactions. It’s a reminder of just how enriching conversations are and how incredibly interconnected the world is. And it’s only made closer by the security experiences that impact us all.   I had…

Read More
1 2,978 2,979 2,980 2,981 2,982 4,178