When the Wi-Fi Alliance — a global consortium of industry players — recently unveiled this new standard, safer public Wi-Fi was just one of the benefits it touted. Here are more details on that and other major features of WPA3.
Read post
IT pros can expect to deal with an increasing number of cyber extortion and IoT attacks over the next three years, according to Ponemon’s latest research. Here’s why cybersecurity must move beyond prevention and embrace a broader approach.
Read post
Cisco’s latest cybersecurity report is hot off the presses, packed with details on how malware is becoming more sophisticated and attackers more evasive. Here’s a wrap-up of the report’s findings on new (and old) cyber threats, and how to prepare for what’s ahead.
Read post
Although more CISOs now have a seat at the table, what they do once they get there varies dramatically. At a recent ITAC event in Toronto, Cisco’s CISO explained how to work with line-of-business managers, make security a priority and cut internal vulnerabilities.
Read post
Fraudulent surveys, which pop up onto your computer screen and appear to come from your ISP, are becoming more commonplace. Not only are these annoying, but they carry other risks such as malware. Here’s what you can do if it happens to you.
Read post
Most breach post-mortems focus on the granular reasons a hack took place but don’t explore the systemic cultural issues within an organization that allowed the breach to happen, according to a panel of security experts at last month’s SecTOR conference in Toronto.
Read post
IT security can feel like a never-ending battle — and enterprises are responding by throwing money at the problem. But Jamie Hari, Zayo’s director of cloud and security, challenges that notion at SecTOR with tips to move your security maturity forward at little cost.
Read post
Organizations can never get a 100 per cent guarantee of cloud security, but there are a few things they can — and should — be doing when evaluating third-party services. Research firm Gartner offers up some helpful recommendations.
Read post
Cisco’s 2017 Midyear Cybersecurity Report says destruction of service attacks could leave organizations without a backup to restore systems after an attack. But it also points to a resurgence in traditional attacks, like adware and spyware, as well as a social engineering attack that may be more...
Read post
Conventional methods of protecting information resources aren’t going to cut it in a world of IoT and AI. A Gartner expert explains why we need to rethink our approach to security and risk management, and how to create a more resilient digital business infrastructure.
Read post
The three A’s — artificial intelligence, algorithms and automation — are game-changers when it comes to cybersecurity. But that doesn’t mean we should rely too heavily on AI (or on any one particular technology) in the fight against hackers and cyber attackers.
Read post
Organizations in fleet management, retail, manufacturing and government are prime targets for significant data breaches this year, industry analysts predict.
Read post
Mirai, Mirai, on the wall. Who’s the least secure of all?
Read post
Our monthly roundup of the best discussions in the online community, from the threat landscape in 2017 to admissions of guilt over poor password policies.
Read post
It’s not that corporate cybersecurity teams aren’t looking hard enough for threats and breaches, according to a survey by Accenture. It’s that they’re not looking in the right place.
Read post
Our monthly roundup of the best discussions on the online community, from the rise of ransomware, to new malware variants and the continued use of ‘password’ as a password.
Read post
Cracks — such as arduous vetting and suspect certificate authorities — are starting to show in the digital certificate system, which authenticates the identity of websites that interact with our mobile devices. Here’s what you need to know to keep your network communications safe.
Read post
Today’s hackers don’t just encrypt your files and hold them hostage, promising to supply a decryption key after ransom is paid. Many of them also encrypt the file names and extensions and delete all shadow copies of your files. Here’s what you can do to both defend and mitigate.
Read post
It’s adaptable. It’s everywhere. And it’s sparking a lot of creative thinking.
Read post
Security culture is not just related to awareness and training — it’s the sum of subconscious human behaviours that people repeat based on prior experiences and collectively held beliefs, according to one Gartner analyst. Here’s what to do about it.
Read post
Software-defined networking, voice-over-IP and enterprise mobile security systems come in for a beating during the annual gathering of IT security experts.
Read post
We talk to Mike Vamvakaris about the current threat landscape, how it’s evolving and why Zayo is launching a Global Security Operations Center.
Read post
Half of Canadian companies feel confident in their ability to protect against ransomware, according to a new survey. Yet more than a third of those surveyed were hit with ransomware in the past year, and attacks are much higher here than in the U.S. What’s the disconnect?
Read post
We know that passwords are dead. They just haven’t stopped moving yet. Or rather, they move too much — into the wrong hands.
Read post
A new twist on software-defined networking makes the hybrid wide-area network feasible for organizations worried about data security.
Read post