Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

FREE APPS: Not as free as you might think!

When searching the app store (on a budget), we come across millions of “free” apps and we are inclined to download them. What is the difference between...

SSL 101: Who Dis?!

Secure Socket Layer certificates were first used in the early 90’s and have since grossed over 2 trillion dollars via enabling e-commerce sales. In the market,...

DUDE, WHERE’S MY ENDPOINT: The plight of endpoint security

Cyber spending is often done at many levels, most commonly the firewall and advanced analytic solutions. The essential gap that is missed is protecting endpoints within the...

Cyber-Weapons: The Krav Maga of cyber security

Unexpected tactically-driven attacks are so effective in the industry today because of the violent nature and overall surprise. Krav Maga is a guerilla hand-to-hand combat fighting style...

MINE OR YOURS: Who owns the information on your mobile device?

Mobile security is becoming a huge concern for the business and enterprise world as the BYOD discussion is an expensive one – either companies enforce a corporate...

Fort Knox or Cardboard Box: Importance of Physical Security

Are you spending millions of dollars annually but still lack the ability to prevent cyber espionage? The answer is more simple than you think – Physical Security. Over-spending...

HACKERS WANT YOU: to fall for phishing emails

One of the easiest methods of infiltrating the most security-driven companies, is the classic phishing email. Phishing emails are designed to take advantage of easily exploitable employees...

MALWARE: A Virus or not a virus

It is often misconstrued by the media that all cyber-attacks are a result of viruses. A virus is a type of malware, not the other way around....

EVEN SUPERHEROES NEED TO WORK TOGETHER: Holistic Solutions

Even the greatest superheroes, like Superman, had to work in conjunction with others to protect the world. The same idea applies to cyber security; no single solution...

EVERY MASTERPIECE HAS A GREAT BEGINNING: Introducing Cyber SITREP!

The Cyber SITREP blog series got its name from combining my love of all things Cyber, and my background serving in the Canadian Armed Forces. The term...

Must Read