Though the guidelines were intended to provide federally regulated financial institutions with a framework for building their cyber-security defense, any organization with an Internet connection should be paying attention.
Read post
The current global regulatory crackdown on data and privacy breaches — including Canada’s new Digital Privacy Act — is convincing more businesses to take a look at cyber insurance.
Read post
High-availability needs and surges in traffic could make popular destination a target for cybercriminals. Effective protection requires advanced and complete solutions.
Read post
Jason B. Brown explains how simple steps could be taken immediately to reduce at least some of the IT security threats facing Canadian companies
Read post
Unless the federal government changes its approach to web governance, it could wind up doing a lot of damage.
Read post
Global security strategist Trey Ford speaks at the recent Sector conference with a keynote that compares data protection with flying
Read post
The final post in our three-part series puts complex jargon about data breaches in plain language to educate senior management about the threats they face
Read post
The next post in our three-part series puts complex jargon about data breaches in plain language to educate senior management about the threats they face
Read post
We begin a three-part series that IT professionals can use to demystify data protection to the CEO, the board and other stakeholders
Read post
Digital disruptions has made the perimeter for merchants wider than ever before, but IT leaders are starting to stock up on some solid defence strategies
Read post
A 1.5-minute clip shows the basics of outlining a professional background in running critical parts of enterprise IT. But there is always room for improvement
Read post
A recent report shows why and how we are increasingly dupes into taking a course of action that directly leads to IT security being breached
Read post
Our monthly roundup of the best discussions on the online community, from phishing attacks to protecting your network from disgruntled techies.
Read post
Analytics, algorithms and behavioural modeling can spot anomalies and potential fraud. But that’s just the beginning
Read post
The hacker attack on Sony Pictures Entertainment changed the way companies think about security. Now it’s time to develop a true defence-in-depth strategy
Read post
John Chambers launches the firm’s mid-year security report with suggestions that we need to work better together as the Internet of Things takes shape
Read post
Meet CloudMask, an Ottawa company whose tokenization technology may be one of the best ways to mitigate the effects of insider threats
Read post
Cybercriminals are moving beyond mere hacking to extort money from their victims. Paying up, however, could be a big mistake
Read post
A recent panel at SC Congress brings together public sector IT security executives to talk about how their role is evolving
Read post
At the recent SC Congress event, Dave Lewis provided helpful advice on IT security with a touch of humour woven in
Read post
If the Department of Homeland Security struggles to attract the kind of talent it needs, what chance do firms here have?
Read post
A research report predicts customers will increasingly want to use their bodies to access financial data. The researcher outlines some important next steps
Read post
A rise in cyber-security attacks, worries about the Internet of Things and other topics at one of the industry’s major security gatherings
Read post
The annual event in Vancouver is the place to learn how to avoid major IT security incidents. If you didn’t make it, we have you covered
Read post
The best technology works so well you barely notice it. Cyber-criminals, however, don’t miss a thing.
Read post