IT Buzz: What's Now, What's New, What's Next.

IT Buzz Blog.

Looking for a little inspiration, some ideas, or trusted advice? Compugen has you covered.
back image
    Part 4: Why Business Continuity Starts with Cybersecurity
    By: Richard Gariepy
    September 24, 2025
    Part 4: Why Business Continuity Starts with Cybersecurity

    We’ve reached Part 4 of our cybersecurity series. Still with us? That’s a good sign.

    Part 3: How to Build a Cybersecurity Program That Works
    By: Richard Gariepy
    September 03, 2025
    Part 3: How to Build a Cybersecurity Program That Works

    This is Part 3 of our five-part cybersecurity series for Canadian businesses.

    Part 2: What IT Leaders Should Know Before Hiring a 3rd-Party SOC
    By: Richard Gariepy
    August 22, 2025
    Part 2: What IT Leaders Should Know Before Hiring a 3rd-Party SOC

    This is Part 2 of our five-part cybersecurity series for Canadian businesses. If Part 1 helped you lay the groundwork for a stronger security ...

    Part 1: Smarter Risk Assessments for a Stronger Security Foundation
    By: Richard Gariepy
    August 08, 2025
    Part 1: Smarter Risk Assessments for a Stronger Security Foundation

    This is the first in a five-part series helping business and IT leaders navigate today’s cybersecurity realities, from building an internal security ...

    Why “It’s in the Cloud” Isn’t a Real Data Protection Strategy
    By: Harry Zarek + Craig McLellan
    August 05, 2025
    Why “It’s in the Cloud” Isn’t a Real Data Protection Strategy

    “Data doesn’t sleep. Neither should your backup strategy.”

    Microsoft Security Journey: A Strategic Path to Stronger Cyber Resilience
    By: Compugen
    June 27, 2025
    Microsoft Security Journey: A Strategic Path to Stronger Cyber Resilience

    Security Isn’t a Setting. It’s a Strategy. In today’s threat landscape, organizations can’t afford to be reactive. Cybersecurity must evolve into a ...

    The Ultimate Guide to Secure Remote Access: Tools - Part 3
    By: Ken Dohan
    January 08, 2025
    The Ultimate Guide to Secure Remote Access: Tools - Part 3

    5 Ways Enterprise Secure Remote Access Tools are Superior In the final installment of this three-blog series on Secure Remote Access (SRA), we ...

    The Ultimate Guide to Secure Remote Access: Limitations - Part 2
    By: Ken Dohan
    December 11, 2024
    The Ultimate Guide to Secure Remote Access: Limitations - Part 2

    Limitations of OEM Secure Remote Access Tools In the second installment of this three-blog series on Secure Remote Access (SRA) we explore why using ...

    5 Reasons Why Businesses Are Adopting ChromeOS
    By: Compugen
    December 06, 2024
    5 Reasons Why Businesses Are Adopting ChromeOS

    With the rise of distributed workforces and cloud adoption, organizations face unprecedented levels of data and identity sprawl, increasing the risk ...