HomeSecurity

Security

Retailers at critical juncture due to severe tech gaps: SOTI study

A new study released today reveals that the retail industry in Canada and elsewhere around the world faces major challenges as a result of...

Government vows to address corporate privacy worries in proposed cybersecurity law

Parliamentary hearings opened Monday into proposed new laws that would give Ottawa authority over the cybersecurity readiness of critical infrastructure providers, with the government...

Hearings on Canada’s proposed cybersecurity law begin

Work on the second plank of the Liberal government’s cybersecurity and privacy strategy started Monday afternoon. That’s when the House of Commons Standing Committee on...

Quebec cybersecurity institute gets $1.3 million grant from Google

Google’s philanthropic arm is giving a $1.3 million grant to a Quebec agency for cybersecurity research. The company said today the funds from Google.org are...

Global ransomware threat expected to rise with AI, U.K. cyber authority warns

Artificial intelligence (AI) is expected to increase the global ransomware threat over the next two years, U.K. cyber chiefs have warned in a new...

Stop combining patches with new features, networking vendors advised

Networking vendors should avoid combining critical security updates with new features, to make patches easier to understand, prioritize, and implement, says an industry group,...

SIM card swap led to takeover of SEC’s X account

The hacker who took over the U.S. Security and Exchange Commission’s account on the X social media platform this month did it by fooling...

Data Privacy Week: Get ready for tougher regulation

In 2023, regulators around the world stiffened or vowed to tighten their data privacy and cybersecurity laws. Expect more of that in 2024. With Data...

Toronto to integrate IT systems after ransomware attacks on zoo, public library

After suffering serious ransomware attacks on its zoo and public library system, the city Toronto has decided to integrate its IT systems for better...

A Q&A with Rubrik CEO and venture capitalist Bipul Sinha

Bipul Sinha did not become a successful entrepreneur, engineer and venture capitalist by following staid career moves and adhering to traditional business strategies or...

Should the CIO be solely responsible for keeping AI in check? Info-Tech weighs in

In a recent webinar, research director at Info-Tech Research Group Brian Jackson explained how he thought it was surprising that IT workers think that...

Russian threat group spreading backdoor through phishing, says Google

A Russian-based espionage group known for stealing login credentials of government and military officials is also trying to trick victims into downloading malware. Google’s Threat...

CISOs are both anxious and see opportunities: Report

Chief information and security officers both have feelings of anxiety and see opportunity as the new year starts. That’s the summation of the analysis done...

Holidays are over, but don’t let employees’ guard drop over fake shipping emails

The December holidays are over, but don’t expect phony malware-filled shipping emails to stop being sent to your employees. In fact, researchers at Cofense say...

Ontario city the latest to temporarily lose control of its X account

An Ontario municipality has become the latest to lose temporary access to its X account. Peterborough, Ont., a city of 83,600 about 125km northeast of...

Popular Posts

Security Blogs

Slideshows

How to equip students with the tools to succeed

Many teams used to spend the entire summer updating student devices. But now the Windows 10 ability to manage the devices without having to...

Stay cyber-safe this holiday season

The holidays are a busy time of year, packed with family gatherings, festive parties and hours spent lining up in crowded stores to buy...

How upgrading your network can deliver a competitive advantage

In 2014, Gartner reported that the average cost of network downtime to an enterprise was $5,600 per minute. And even if the network isn't...

The top three network security challenges for 2016

Securing the network has always been a challenge, but it’s only getting more complex, thanks to the rise of cloud applications, programmable networks and...