Torstar Digital (Torstar Corp.)

torstar.com

"Torstar Corporation is a broadly based, progressive media company listed on the Toronto Stock Exchange (TS.B), with a long history in daily and community newspapers, book publishing and digital businesses. Built on the foundation of the Toronto Star, one of North America’s great metropolitan daily newspapers, Torstar has grown into a diversified media company with a growing portfolio of operations in Canada, the United States and around the world. Torstar's approach to digital properties within their media divisions includes owning, partnering and investing in digital companies. Torstar strategically leverages its strengths through a wide variety of business models spread across four categories: content, commerce, consumer and business utility and business solutions."

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Platform Security

LOGICBOOST LABS' LATEST INVESTMENT ENHANCES CYBERSECURITY VALIDATION

LogicBoost Labs | March 09, 2022

news image

LogicBoost Labs, a startup accelerator focused on promoting the growth of early-stage B2B SaaS startups, announced today an investment into Information Shield, a provider of products and services that help automate the process of building and validating a robust cyber security program. The investment package includes putting cash on the balance sheet for growth and expert advice in sales, marketing, customer success, and tech development from the in-house team of LogicBoost Labs e...

Read More

DATA BREACH: WHY IT’S TIME TO ADOPT A RISK-BASED APPROACH TO CYBERSECURITY

Help Net security | January 28, 2020

news image

The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks following the initial attack, Travelex struggled to bring its customer-facing systems back online. Worse still, despite Travelex’s assurances that no customer data had been compromised, hackers were demanding $6 million for 5GB of sensitive customer information they claim to have downloaded. Providing services to some of the ...

Read More

IT SECURITY LEADERS ENGAGE IN RISKY SECURITY, PASSWORD HABITS

Helathitsecurity | February 25, 2020

news image

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of usable security tools, according to a recent report from Yubico and conducted by the Ponemon Institute. Researchers surveyed 2,507 global IT and IT security leaders, as well as 563 individual users. They found that while most IT leaders have strong awareness of best practice authentication and password ...

Read More

Software Security

IBOSS JOINS MICROSOFT INTELLIGENT SECURITY ASSOCIATION (MISA)

iboss, Inc. | June 02, 2022

news image

iboss, a leader in Zero Trust Edge, announces the expansion of its relationship with Microsoft by joining the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISV) and managed security service providers (MSSP) that have integrated their security products and services with Microsoft’s security products. Through this collaboration with Microsoft, joint customers benefit from secure, fast access to resources from anywhere, which also allows cust...

Read More
news image

Platform Security

LOGICBOOST LABS' LATEST INVESTMENT ENHANCES CYBERSECURITY VALIDATION

LogicBoost Labs | March 09, 2022

LogicBoost Labs, a startup accelerator focused on promoting the growth of early-stage B2B SaaS startups, announced today an investment into Information Shield, a provider of products and services that help automate the process of building and validating a robust cyber security program. The investment package includes putting cash on the balance sheet for growth and expert advice in sales, marketing, customer success, and tech development from the in-house team of LogicBoost Labs e...

Read More
news image

DATA BREACH: WHY IT’S TIME TO ADOPT A RISK-BASED APPROACH TO CYBERSECURITY

Help Net security | January 28, 2020

The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks following the initial attack, Travelex struggled to bring its customer-facing systems back online. Worse still, despite Travelex’s assurances that no customer data had been compromised, hackers were demanding $6 million for 5GB of sensitive customer information they claim to have downloaded. Providing services to some of the ...

Read More
news image

IT SECURITY LEADERS ENGAGE IN RISKY SECURITY, PASSWORD HABITS

Helathitsecurity | February 25, 2020

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of usable security tools, according to a recent report from Yubico and conducted by the Ponemon Institute. Researchers surveyed 2,507 global IT and IT security leaders, as well as 563 individual users. They found that while most IT leaders have strong awareness of best practice authentication and password ...

Read More
news image

Software Security

IBOSS JOINS MICROSOFT INTELLIGENT SECURITY ASSOCIATION (MISA)

iboss, Inc. | June 02, 2022

iboss, a leader in Zero Trust Edge, announces the expansion of its relationship with Microsoft by joining the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISV) and managed security service providers (MSSP) that have integrated their security products and services with Microsoft’s security products. Through this collaboration with Microsoft, joint customers benefit from secure, fast access to resources from anywhere, which also allows cust...

Read More

Resources

resource image

Data Security, Enterprise Security

Wallarm Demo: Shadow API Detection

Video

resource image

Enterprise Security, Platform Security, Software Security

Application Security: Paving the Way to Counter Emerging Cyberthreats

infographic

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us