Articles By Howard Solomon

Image from  Shutterstock.com (c) Maksim Kabakou

Apple security update sparked by Canadian researchers

Work by a Canadian human rights and technology research team has led to Apple quickly pushing out an update to...

August 26th, 2016 Howard Solomon
storage

Data lakes mean a plunge into the security pool

Many organizations today are convinced that collecting and hoarding data is their future: Without big data, how can they get...

August 26th, 2016 Howard Solomon
Canadian currency, money, dollar bills

Trying to measure the cost of a breach

CISOs know that data breaches cost money. One question is how much; another is whether the rest of the organization...

August 25th, 2016 Howard Solomon
authentication fob

Ashley Madison attack aided by credentials theft: Report

Poor administrator identity and access management controls were at the heart of last year’s huge data breach at Avid Life...

August 24th, 2016 Howard Solomon
Ashley Madison

Ashley Madison parent company criticized by privacy commissioners over huge breach

Avid Life Media, the Toronto-based parent company of the controversial Ashley Madison dating site that was badly breached a year...

August 23rd, 2016 Howard Solomon
security and privacy issues

Companies 100 per cent worse in cyber security than 10 years ago, says expert

How much of an uphill battle are CISOs facing? A pretty big one, at least according to the headlines. There's...

August 23rd, 2016 Howard Solomon
executives in a business meeting

Putting a new face on old lessons

Sometimes it's hard to find something really new in cybersecurity. Most lessons are riffs on the same rules experts learned...

August 22nd, 2016 Howard Solomon
Data Breach Graphic

Score public data breach reports to restore trust, says security vendor

Some infosec pros think one of the reasons a number of organizations aren't putting enough resources into cyber security is...

August 19th, 2016 Howard Solomon
Image by  Zokara from GettyImages.ca

“Double-compromised” website reveals importance of patching

Compromising a Web site is a common way for threat actors to either get into an organization or spread malware....

August 19th, 2016 Howard Solomon
Matrix Style Password Graphic

Cisco confirms zero-day exploit in alleged NSA tool hack

Have software-breaking tools used by America's respected electronic spy department, the National Security Agency, been compromised? Since news broke over...

August 18th, 2016 Howard Solomon