This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
In an effort to protect national security and intellectual property from foreign threats and bad actors, the Canadian government is setting new guidelines, effective immediately, that work national security considerations into funding criteria for university research.
Counterfeit products make up five to seven percent of world trade, and have cost an estimated 2.5 million jobs worldwide, with 750,000 jobs lost in the U.S. alone. It’s an issue that Brad Minnis, Senior Director, Corporate Safety and Security for Juniper Networks, spends much time and effort to mitigate.
Traveling abroad with technology brings with it certain risks and may subject you to government surveillance in ways that are different from domestic travel. According to the FBI, you shouldn’t expect privacy in most countries outside the United States. Your data is less secure when you travel.
Commercial use of drones for tasks like surveillance and aerial photography/videography creates business efficiencies and new opportunities, but it’s important to understand drones’ inherent security risks and their potential impact on a company.
The internet is a dangerous place, right? Not only is the internet full of hackers trying to steal your corporate information, but they’re also targeting your website and company database to steal credit cards, private health information and other sensitive data to resell on the Dark Web.
Employees need to get their work done without oppressive security protocols, but they need to do so safely. If the team erects too many barriers, employees will find workarounds that jeopardize security.