Articles By Howard Solomon

Canada IT Strategic Plan header

Many federal managers had unneeded access to employees’ personal information: CBC

As many as 70,000 managers had excess and unneeded access to the personal details of all 300,000 federal employees enrolled...

July 21st, 2016 Howard Solomon
bandaid, fix, repair

Exploit kits now adopting recent Office vulnerabilities: Report

Cyber security trends can be hard to nail down because attacker strategies constantly evolve. But a new report from Sophos...

July 19th, 2016 Howard Solomon
security and privacy issues

How to craft a threat intelligence strategy

An increasing number of CISOs are realizing the value of threat intelligence to protecting the enterprise, helping the infosec team...

July 19th, 2016 Howard Solomon
Blockchain_resized

As a blockchain-based project teeters, questions about the technology’s security

A version of this article originally appeared in the July 2016 issue of CSO Digital There's no shortage of futurists,...

July 18th, 2016 Howard Solomon
93998195

Smart contract vulnerability a warning to CISOs, developers

Among the hype surrounding the possibilities of blockchain-based applications is the promise of so-called smart contracts, applications that execute and...

July 18th, 2016 Howard Solomon
Gavel in court

U.S. law can’t force American service providers to turn over foreign data: Court

Organizations  worried about the ability of American law enforcement agencies to get at electronic data in foreign data centres have...

July 15th, 2016 Howard Solomon
Image from  Shutterstock.com (c) Maksim Kabakou

Warning: Upcoming Trojan includes tools to blackmail insiders

Most threats to corporate data come from external actors but the possibility of employees to steal, manipulate or destroy assets...

July 15th, 2016 Howard Solomon
71080359

Organization’s cyber security can have an effect on acquisition, says report

There are three common reasons cyber security has to be among the top priorities for the C-suite: To maintain confidence...

July 14th, 2016 Howard Solomon
Matrix Style Password Graphic

Don’t confuse a vulnerability assessment with a penetration test: Vendor

Infosec pros often find vulnerabilities during a penetration test, but that isn't a vulnerability assessment. The two shouldn't be confused,...

July 13th, 2016 Howard Solomon
ransomware, blackmail

Another reason why paying a ransomware threat isn’t worth it

Ransomware victims willing to talk to the press sometimes suggest there is "honour among thieves" if they've been able to...

July 12th, 2016 Howard Solomon