fin6

Cybercriminals are a motivated, patient lot: how the end-to-end data theft cycle keeps on rolling

While the media is resplendent with articles covering security breaches due to hacks, malware and ransomware, rarely does it cover...

April 27th, 2016 Gary Hilson

IT problems, computer flaws, glitches

It’s time for law enforcement to take DNS seriously

We rely on law enforcement to be our first-line of defence against criminals online and offline. Yet, most law enforcement...

March 15th, 2016 Jacques Latour

HPE Security Research: Cyber Risk Report 2015

HPE Security Research: Cyber Risk Report 2015

This report provides security information leading to a better understanding of the threat landscape, and resources that can aid in...

January 5th, 2016 IT World Canada Team

Next-generation IPS and firewall

Next-generation IPS and firewall

Firewalls are best at controlling access to the network from outside. They are the security guard at the gate who...

November 26th, 2015 IT World Canada Team

Seven steps to software security

Seven steps to software security

Understanding technical security risk begins with knowing how and where vulnerabilities occur within an organization. Vulnerabilities can impact every level...

November 23rd, 2015 IT World Canada Team

Image from Shutterstock.com

The Fortinet Advanced Threat Protection Framework: A Cohesive Approach to Addressing Advanced Targeted Attacks

Discover how its proprietary software, high-performance appliances, and the FortiGuard Labs threat research teams seamlessly work together to deliver security...

May 12th, 2015 IT World Canada Team

Ten tips for more secure sofware

Cisco Annual Security Report 2015

Download The Cisco 2015 Annual Security Report for insights into the ongoing race between attackers and defenders, and how users are...

May 12th, 2015 IT World Canada Team

Feature Security Privacy 1

C-suite execs fear ‘domino effect’ of cyber attacks: Survey

High-ranking corporate executives are worried that in a networked economy, a cyber attack on one company could spill over to...

April 20th, 2015 Nestor E. Arellano

slideshow hacker shutterstock

SIM maker Gemalto says it was ‘probably’ hacked by NSA, GCHQ

It’s likely that the United States National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) carried out the cyber-attack...

February 25th, 2015 Nestor E. Arellano