Majority of cyber attacks coming from legitimate sites: Report

Hackers and cybercriminals are becoming savvier, with the bulk of their attacks now aimed at specific targets, according to a new report from security solutions provider Websense Inc. Instead of launching Hail Mary-esque

Share on LinkedIn Share with Google+ Comment on this article Published on: April 2nd, 2014 IT World Canada Staff

Second NSA security tool found in RSA’s cryptography kit

Security provider RSA adopted a second code generator developed by the United States National Security Agency which effectively made it easier for hackers to defeat the company’s BSafe cryptography kit, according to a

Share on LinkedIn Share with Google+ Comment on this article Published on: March 31st, 2014 Nestor E. Arellano

App security full of holes: Report

You work hard to develop useful and secure applications for your organization or customers, but sometimes it seems like you’re running in quicksand. A recent study by Cenzic Inc., a maker of software

Share on LinkedIn Share with Google+ Comment on this article Published on: March 24th, 2014 Howard Solomon

Palo Alto buys Israeli zero-day attack prevention specialist

Palo Alto Networks which makes next generation firewalls is spending US$200 million to buy an Israeli-based cyber security vendor called Cyvera whose software blocks zero-day attacks on Windows-based endpoints ranging from desktops to

Share on LinkedIn Share with Google+ Comment on this article Published on: March 24th, 2014 Howard Solomon

CIRA part of new security agency

Canada's Internet domain registry is one of a number of organizations banding together in a non-profit group to try to put a dent in the number of criminals abusing the domain name system.

Share on LinkedIn Share with Google+ Comment on this article Published on: March 23rd, 2014 Howard Solomon

How to secure a wired network

Wired networks aren't going away. For one thing, most enterprise-sized organizations have invested too much in them to be completely replaced with Wi-Fi. For another, wireless comes with its own problems to be

Share on LinkedIn Share with Google+ Comment on this article Published on: March 17th, 2014 Howard Solomon

Technology alone won’t make a great security ops centre: Study

Many large organizations have set up security operations centres staffed with analyst teams to help fight the increasing number of cyberthreats challenging network security. But a vendor that sells security solutions and has

Share on LinkedIn Share with Google+ Comment on this article Published on: March 4th, 2014 Howard Solomon

Tufin updates Orchestration Suite

Tufin Technologies has updated its suite of products for orchestrating security policies for network devices. Version  R14-1 of the Tufin Orchestration Suite -- which includes its SecureTrack firewall management, SecureApp application connectivity management

Share on LinkedIn Share with Google+ Comment on this article Published on: March 3rd, 2014 Howard Solomon

The IT leader as security spokesman

He was like a shadow guest at our recent Technicity conference — mentioned by nearly everyone, cited as a source of great concern and potential danger to all manner of organizations across Toronto and

Share on LinkedIn Share with Google+ Comment on this article Published on: February 26th, 2014 Shane Schick