Articles By Howard Solomon

security and privacy issues

What confident CISOs have in common

What works in protecting an enterprise is a matter of debate in an era when the proper way for a...

April 20th, 2017 Howard Solomon
People standing in a business meeting

Fighting ‘the boy’s club’ mentality in cyber security

Few IT leaders would deny that having staff with a wide range of backgrounds is an advantage. But with men...

April 19th, 2017 Howard Solomon
danger sign, IT risks, security, malware, hackers

A mysterious IoT botnet, and what network admins can do to lower the odds of infection

It's not very often that infosec pros get a warning of an threat on the horizon, but a news report...

April 17th, 2017 Howard Solomon
security and privacy issues

How to turn threat information into threat intelligence

Infosec teams face a deluge of data every day from an array of network and application sensors as well as...

April 17th, 2017 Howard Solomon
DDoS Attack Brick Wall

Admins warned to filter ports with new DDoS attacks increasing

Administrators are being warned – again – to make sure only necessary ports on network devices are open now that...

April 12th, 2017 Howard Solomon
Canadian currency, money, dollar bills

Bigger budget tops wish list of Canadian infosec pros: Survey

Canadian infosec pros would rather have bigger budgets than staff with more security skills, a new vendor survey suggests. When...

April 12th, 2017 Howard Solomon

Password analysis shows employees still aren’t getting the message

What nine letter word brings heartburn to every CISO? Passwords. Essential to almost any environment today except those using advanced...

April 11th, 2017 Howard Solomon
security and privacy issues

Canada one of sources for destructive IoT botnet

Canada is among the countries that have been stung by a mysterious botnet infecting Internet-connected devices using the Linux and...

April 10th, 2017 Howard Solomon

Threat sharing efforts still fall short, says McAfee

With cyber attackers finding a multitude of ways of evading defences, threat intelligence sharing is taking on increasing importance. Whether...

April 7th, 2017 Howard Solomon

Why a CISO has to be prepared for the unknown

It's bad enough that CISOs have to be prepared for the wide variety of possible known attack vectors -- phishing...

April 6th, 2017 Howard Solomon