Augment encryption with tokenization

For the protection of sensitive data, tokenization is every bit as important as data encryption. We are all very familiar with the requirement to encrypt sensitive data at rest as well as in

Published on: September 17th, 2014 Michael Ball

Monitoring software adds ability to send alerts

Organizations with very sensitive data don’t merely have tough network security gear; they may also go so far as recording every keystroke employees enter and monitoring for suspicious activity. One supplier is Boston-based

Published on: September 15th, 2014 Howard Solomon

Are most Canadian companies willing to “roll the dice” on data breaches?

We roll our eyes when news reports reveal another data breach, but maybe we shouldn’t be surprised: A privacy lawyer at one of the country’s biggest law firms, says 70 per cent of

Published on: September 12th, 2014 Howard Solomon

No short-cuts to IT security, Canadian retailers warned

Retailers around the world are reeling from an avalanche of data thefts this year, leaving many paralyzed about what to do. But a Canadian security expert warned retailers here not to take short-cuts

Published on: September 12th, 2014 Howard Solomon

Time to get more aggressive on cybersecurity?

The revelation this week that U.S. -based outlets of Home Depot may have suffered a stunning data breach -- one source thinks data was siphoned from every one of its 2,200 stores --

Published on: September 4th, 2014 Howard Solomon

When meeting the IT security standard isn’t enough

There's a price to be paid for organizations that aren't on the leading edge of security -- they usually get caught. That's the lesson from an incident a Canadian penetration tester ran into

Published on: September 1st, 2014 Howard Solomon

U.S. warns on POS systems

Canadian CSOs in the retail sector need to be aware of a warning issued Friday by US-CERT that the Backoff point of sale malware continues to be a threat in the sector. Seven

Published on: August 25th, 2014 Howard Solomon

Heartbleed exposed cache problem: Researchers

Most IT security pros think of the Heartbleed bug as a software vulnerability in some versions of the OpenSSL software library. Certainly that's what they thought last April when the first word of

Published on: August 17th, 2014 Howard Solomon

SQL injection attacks can be stopped, says security expert

One of the oldest ways of attacking an SQL database is still successfully being exploited by criminals to gain access to personal information, yet according to one expert it’s easy to prevent. That’s

Published on: August 7th, 2014 Howard Solomon