Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

MAKING SENSE OF TOMORROW’S CYBERSECURITY TRENDS

In cybersecurity, new threats and vulnerabilities appear at break-neck speed – faster than any one security team or analyst can manage. As new technologies create opportunities to...

SonicWall Capture Cloud Platform Ushers in New Era of Threat Intelligence, Connectivity and Automation

CDW's + SonicWall's mission is to help organizations protect themselves from the growing number of cyber attacks in the fast-moving threat landscape. There are many schools of thought...
CDW Canada - Experts Who Get IT

8 Cyber Security Predictions for 2018

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from more than 1 million sensors around the world, performs rigorous testing and...

FAKE APPS: Mirror mirror on the wall, which of these apps is real amongst...

What is the difference between a real and fake app? Well, one is legitimate and one is malicious. You would think that this topic would be general...

WAR-DRIVING: Coffee goers beware!

Wardriving is the art of executing a mobile attack surface, by literally being on the move while propagating a wireless attack. You achieve this by creating an...

SMISHING & GREYWARE: Come again?

Let’s talk about some areas of mobile security that fly under the proverbial radar; Smishng & Greyware. These are terms that the 99.99% of users never hear...

FREE APPS: Not as free as you might think!

When searching the app store (on a budget), we come across millions of “free” apps and we are inclined to download them. What is the difference between...

SSL 101: Who Dis?!

Secure Socket Layer certificates were first used in the early 90’s and have since grossed over 2 trillion dollars via enabling e-commerce sales. In the market,...

DUDE, WHERE’S MY ENDPOINT: The plight of endpoint security

Cyber spending is often done at many levels, most commonly the firewall and advanced analytic solutions. The essential gap that is missed is protecting endpoints within the...

Cyber-Weapons: The Krav Maga of cyber security

Unexpected tactically-driven attacks are so effective in the industry today because of the violent nature and overall surprise. Krav Maga is a guerilla hand-to-hand combat fighting style...

Must Read